Investigation Model for Ddos Attack Detection in Real-Time

Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. T...

Full description

Bibliographic Details
Main Author: Ahmed, Abdulghani Ali
Format: Article
Language:English
Published: Penerbit UMP 2015
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/11843/
http://umpir.ump.edu.my/id/eprint/11843/
http://umpir.ump.edu.my/id/eprint/11843/
http://umpir.ump.edu.my/id/eprint/11843/1/Investigation%20Model%20For%20Ddos%20Attack%20Detection%20In%20Real-Time.pdf
id ump-11843
recordtype eprints
spelling ump-118432018-05-16T08:00:14Z http://umpir.ump.edu.my/id/eprint/11843/ Investigation Model for Ddos Attack Detection in Real-Time Ahmed, Abdulghani Ali QA76 Computer software Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack. Penerbit UMP 2015 Article PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/11843/1/Investigation%20Model%20For%20Ddos%20Attack%20Detection%20In%20Real-Time.pdf Ahmed, Abdulghani Ali (2015) Investigation Model for Ddos Attack Detection in Real-Time. International Journal of Software Engineering & Computer Sciences (IJSECS), 1. pp. 93-105. ISSN 2289-8522 http:// dx.doi.o rg/10.15282/ijsecs.1.2015.8.0008 DOI: 10.15282/ijsecs.1.2015.8.0008
repository_type Digital Repository
institution_category Local University
institution Universiti Malaysia Pahang
building UMP Institutional Repository
collection Online Access
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Ahmed, Abdulghani Ali
Investigation Model for Ddos Attack Detection in Real-Time
description Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack.
format Article
author Ahmed, Abdulghani Ali
author_facet Ahmed, Abdulghani Ali
author_sort Ahmed, Abdulghani Ali
title Investigation Model for Ddos Attack Detection in Real-Time
title_short Investigation Model for Ddos Attack Detection in Real-Time
title_full Investigation Model for Ddos Attack Detection in Real-Time
title_fullStr Investigation Model for Ddos Attack Detection in Real-Time
title_full_unstemmed Investigation Model for Ddos Attack Detection in Real-Time
title_sort investigation model for ddos attack detection in real-time
publisher Penerbit UMP
publishDate 2015
url http://umpir.ump.edu.my/id/eprint/11843/
http://umpir.ump.edu.my/id/eprint/11843/
http://umpir.ump.edu.my/id/eprint/11843/
http://umpir.ump.edu.my/id/eprint/11843/1/Investigation%20Model%20For%20Ddos%20Attack%20Detection%20In%20Real-Time.pdf
first_indexed 2023-09-18T22:12:51Z
last_indexed 2023-09-18T22:12:51Z
_version_ 1777415143146127360