Proceedings ArticleDOI
A Novel Cookie-Based DDoS Protection Scheme and its Performance Analysis
Rongfei Zeng,Chuang Lin,Hongkun Yang,Yuanzhuo Wang,Yang Wang,Peter D. Ungsunan +5 more
- pp 861-867
Reads0
Chats0
TLDR
A cookie-based scheme to protect systems from DoS and DDoS attacks is extended and a novel queuing network model is adopted to analyze this scheme by estimating two essential metrics, i.e. the mean total response time and the mean queue length of MAP.Abstract:
Seamless handover is one of the most attractive research fields in B3G systems. Many mechanisms are proposed to provide certain QoS guarantees in handovers of mobile systems, which would also introduce new threats, such as DoS and DDOS attacks. In this paper, we extend a cookie-based scheme to protect systems from DoS and DDoS attacks. We also adopt a novel queuing network model to analyze our scheme by estimating two essential metrics, i.e. the mean total response time and the mean queue length of MAP. Numerical results indicate that our mechanism works better than the traditional cookie-based scheme and it could effectively help networks defend against abnormal attacks in the handover process.read more
Citations
More filters
Journal ArticleDOI
Secure Monitoring of Patients With Wandering Behavior in Hospital Environments
TL;DR: A security application for an SDN controller that can be used to enforce fine granular policies for communication between the hosts, real time location tracking of the patients, and deal with attacks on the hospital networks is developed.
Proceedings ArticleDOI
Security Techniques for Beyond 3G Wireless Mobile Networks
TL;DR: A security architecture for counteracting denial of service attacks in Beyond 3G (B3G) network architecture with mobile nodes is proposed and has distinct advantages such as monitoring of the traffic to the victim node and the attack traffic being dropped before reaching the victim.
Journal ArticleDOI
Security Techniques for Counteracting Attacks in Mobile Healthcare Services.
TL;DR: Techniques for counteracting denial of service attacks on mobile devices that are providing the user's health related information and for securing the communication between mobile nodes and healthcare service providers on the Internet are proposed.
Proceedings ArticleDOI
Counteracting DDoS attacks in WLAN
TL;DR: It is described how mobile IP protocol in conjunction with the model can be used to deal efficiently with the attacks on mobile nodes to counteracting denial of service attacks in wireless based network architecture with mobile nodes.
Journal ArticleDOI
Securing wireless mobile nodes from distributed denial-of-service attacks
TL;DR: This paper proposes techniques to counteract distributed denial‐of‐service attacks on wireless mobile devices and describes the operation and architectural components of the model that is able to efficiently deal with the attacks.
References
More filters
Journal ArticleDOI
A taxonomy of DDoS attack and DDoS defense mechanisms
Jelena Mirkovic,Peter Reiher +1 more
TL;DR: This paper presents two taxonomies for classifying attacks and defenses in distributed denial-of-service (DDoS) and provides researchers with a better understanding of the problem and the current solution space.
Proceedings ArticleDOI
Advanced and authenticated marking schemes for IP traceback
Dawn Song,Adrian Perrig +1 more
TL;DR: Two new schemes are presented, the advanced marking scheme and the authenticated marking scheme, which allow the victim to trace-back the approximate origin of spoofed IP packets and provide efficient authentication of routers' markings such that even a compromised router cannot forge or tamper markings from other uncompromised routers.
Journal ArticleDOI
DDoS defense by offense
TL;DR: This paper presents the design, implementation, analysis, and experimental evaluation of speak-up, a defense against application-level distributed denial-of-service (DDoS), in which attackers cripple a server by sending legitimate-looking requests that consume computational resources.
Journal ArticleDOI
Sustaining availability of Web services under distributed denial of service attacks
Jun Xu,Wooyong Lee +1 more
TL;DR: A practical DDoS defense system that can protect the availability of web services during severe DDoS attacks and is evaluated based on a novel game theoretical framework, which characterizes the natural adversarial relationship between a DDoS adversary and the proposed system.