CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Simulation and Detection of LDDoS attacks using Queuing Algorithms

by Kamal Preet Kaur, Navdeep Kaur, Gurjeevan Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 88 - Number 2
Year of Publication: 2014
Authors: Kamal Preet Kaur, Navdeep Kaur, Gurjeevan Singh
10.5120/15325-3639

Kamal Preet Kaur, Navdeep Kaur, Gurjeevan Singh . Simulation and Detection of LDDoS attacks using Queuing Algorithms. International Journal of Computer Applications. 88, 2 ( February 2014), 32-36. DOI=10.5120/15325-3639

@article{ 10.5120/15325-3639,
author = { Kamal Preet Kaur, Navdeep Kaur, Gurjeevan Singh },
title = { Simulation and Detection of LDDoS attacks using Queuing Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 88 },
number = { 2 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 32-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume88/number2/15325-3639/ },
doi = { 10.5120/15325-3639 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:06:36.040610+05:30
%A Kamal Preet Kaur
%A Navdeep Kaur
%A Gurjeevan Singh
%T Simulation and Detection of LDDoS attacks using Queuing Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 88
%N 2
%P 32-36
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This study aims at the evaluation of queuing algorithms using NS2 simulator. The recent LDDoS attacks cause more severe damage to the TCP based applications than the traditional DDoS attacks. The congestion participation rate (CPR) approach is used for detection and prevention of LDDoS attacks. Earlier approaches can only detect the LDDoS attacks. The CPR approach using queuing management algorithms shows better results than the DFT approach. The simulations are done using various parameters such as throughput, delay and bandwidth. Drop tail and red software are also compared using CPR approach; the better performance is given by RED approach using CPR.

References
  1. Zhang, C. , Cai, Z. , Chen,W. , Luo, X. , and Yin, J. 2012. Flow level detection and filtering of low-rate DDoS.
  2. Bhuyan, M. H. , Kashyap. J. , Bhattacharyya, D. K. , and Kalita, J. K. . Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions.
  3. Douligeris, C. and Mitrokotsa, A. 2004. DDoS attacks and defense mechanisms: classification and state-of-the-art.
  4. Agrawal, M. , Tiwari, N. , Chaurasia, L. A. and Saraf, J. 2009. Performance Analysis and QoS Assessment of Queues over Multi-Hop Networks.
  5. Kumar, S. , Bhandari, A. , Sangal, A. L. and Saluja, K. K. 2011. Queuing Algorithms Performance against Buffer Size and Attack Intensities.
  6. Afrasiabi, S. and Abazari, F. 2013. The evaluation of the behavior of computer networks by NS simulator and the effect of queuing systems in the performance of especial networks.
  7. Xiao, B. , Chen, W. and He, Y. A novel approach to detecting DDoS attacks at an early stage.
  8. Hu, N. , Ren, L. and Chang, J. Evaluation of Queue Management Algorithms.
  9. Athuraliya, S. , Low, S. H. , Li, V. H. and Yin, Q. 2001. REM: Active Queue Management.
  10. Zhi-jun, W. , Hai-tao, Z. , Ming-hua, W. and Bao-song, P. 2012. MSABMS-based approach of detecting LDoS attack.
  11. Ghansela, S. 2013. Network Security: Attacks, Tools and Technique.
  12. Lee, K. , Kim, J. , Kwon, K. H. , Han, Y. and Kim, S. 2008. DDoS attack detection method using cluster analysis.
Index Terms

Computer Science
Information Sciences

Keywords

DROPTAIL RED REM NS2