CQUniversity
Browse

Simulation and analysis of DDos in active defense environment

chapter
posted on 2017-12-06, 00:00 authored by Z Li, Yang Xiang, D He
Currently there is very few data that can describe the whole profile of a DDoS attack. In this paper, the active DDoS defense system deploys a number of sub-systems, such as Flexible Deterministic Packet Marking (FDPM) and Mark-Aided Distributed Filtering (MADF). In addition, two DDoS tools, TFN2K and Trinoo, are adopted and integrated into SSFNet to create virtual DDoS networks to simulate the attacks. Then, simulation experiments are used to evaluate the performance of the active DDoS defense system. At last, we set up a model to describe the interactions between DDoS attack and defense party, which allows us to have a deep insight of the interactions between the attack and defense parties. Experiment results shows that the model can precisely estimate the defense effectiveness of the system when it encounters attacks.

Funding

Category 1 - Australian Competitive Grants (this includes ARC, NHMRC)

History

Editor

Wang Y; Cheung Y; Liu H

Start Page

878

End Page

886

Number of Pages

9

ISBN-10

3540743766

ISBN-13

9783540743767

Publisher

Springer

Place of Publication

Berlin

Open Access

  • No

External Author Affiliations

Faculty of Business and Informatics; Xi nan shi you da xue (China); Xiamen da xue;

Era Eligible

  • Yes

Number of Chapters

116

Usage metrics

    CQUniversity

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC