A comprehensive study of distributed Denial-of-Service attack with the detection techniques
Creators
- 1. Universiti Tun Hussein Onn Malaysia
- 2. Universiti Kebangsaan Malaysia
- 3. University of Basrah
Description
With the dramatic evolution in networks nowadays, an equivalent growth of challenges has been depicted toward implementing and deployment of such networks. One of the serious challenges is the security where wide range of attacks would threat these networks. Denial-of-Service (DoS) is one of the common attacks that targets several types of networks in which a huge amount of information is being flooded into a specific server for the purpose of turning of such server. Many research studies have examined the simulation of networks in order to observe the behavior of DoS. However, the variety of its types hinders the process of configuring the DoS attacks. In particular, the Distributed DoS (DDoS) is considered to be the most challenging threat to various networks. Hence, this paper aims to accommodate a comprehensive simulation in order to figure out and detect DDoS attacks. Using the well-known simulator technique of NS-2, the experiments showed that different types of DDoS have been characterized, examined and detected. This implies the efficacy of the comprehensive simulation proposed by this study.
Files
39 21266 10feb 2feb 21oct19 arf.pdf
Files
(734.4 kB)
Name | Size | Download all |
---|---|---|
md5:17580e20a06b0b1ccb4ab03018ead135
|
734.4 kB | Preview Download |