Investigation Model for Ddos Attack Detection in Real-Time
Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. T...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UMP
2015
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/11843/ http://umpir.ump.edu.my/id/eprint/11843/ http://umpir.ump.edu.my/id/eprint/11843/ http://umpir.ump.edu.my/id/eprint/11843/1/Investigation%20Model%20For%20Ddos%20Attack%20Detection%20In%20Real-Time.pdf |
id |
ump-11843 |
---|---|
recordtype |
eprints |
spelling |
ump-118432018-05-16T08:00:14Z http://umpir.ump.edu.my/id/eprint/11843/ Investigation Model for Ddos Attack Detection in Real-Time Ahmed, Abdulghani Ali QA76 Computer software Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack. Penerbit UMP 2015 Article PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/11843/1/Investigation%20Model%20For%20Ddos%20Attack%20Detection%20In%20Real-Time.pdf Ahmed, Abdulghani Ali (2015) Investigation Model for Ddos Attack Detection in Real-Time. International Journal of Software Engineering & Computer Sciences (IJSECS), 1. pp. 93-105. ISSN 2289-8522 http:// dx.doi.o rg/10.15282/ijsecs.1.2015.8.0008 DOI: 10.15282/ijsecs.1.2015.8.0008 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
Universiti Malaysia Pahang |
building |
UMP Institutional Repository |
collection |
Online Access |
language |
English |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Ahmed, Abdulghani Ali Investigation Model for Ddos Attack Detection in Real-Time |
description |
Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack. |
format |
Article |
author |
Ahmed, Abdulghani Ali |
author_facet |
Ahmed, Abdulghani Ali |
author_sort |
Ahmed, Abdulghani Ali |
title |
Investigation Model for Ddos Attack Detection in Real-Time |
title_short |
Investigation Model for Ddos Attack Detection in Real-Time |
title_full |
Investigation Model for Ddos Attack Detection in Real-Time |
title_fullStr |
Investigation Model for Ddos Attack Detection in Real-Time |
title_full_unstemmed |
Investigation Model for Ddos Attack Detection in Real-Time |
title_sort |
investigation model for ddos attack detection in real-time |
publisher |
Penerbit UMP |
publishDate |
2015 |
url |
http://umpir.ump.edu.my/id/eprint/11843/ http://umpir.ump.edu.my/id/eprint/11843/ http://umpir.ump.edu.my/id/eprint/11843/ http://umpir.ump.edu.my/id/eprint/11843/1/Investigation%20Model%20For%20Ddos%20Attack%20Detection%20In%20Real-Time.pdf |
first_indexed |
2023-09-18T22:12:51Z |
last_indexed |
2023-09-18T22:12:51Z |
_version_ |
1777415143146127360 |