Paper Title:
Half-Droptail: Algorithm to Mitigate LDoS Attacks
  Abstract

Low-Rate Denial-of-Service (LDoS) attack was a new type of denial-of-service attack, the queue management algorithm were found valuable to this attack, especially Droptail. In this paper, based on the impacts of the parameter setting of the Droptail on the LDoS attack, we proposed the Half-Droptail algorithm by changing parameter on the queue management algorithm. We made a set simulation of this algorithm, and the results show that the algorithm can effectively improve the defense performance of algorithm itself.

  Info
Periodical
Chapter
Chapter 4: Engineering Information System
Edited by
Elwin Mao and Linli Xu
Pages
315-319
DOI
10.4028/www.scientific.net/AEF.1.315
Citation
J. Zhang, H. P. Hu, B. Liu, L. Chen, "Half-Droptail: Algorithm to Mitigate LDoS Attacks", Advanced Engineering Forum, Vol. 1, pp. 315-319, 2011
Online since
September 2011
Export
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Zhong Ping Zhang, Yong Xin Liang
Chapter 5 Information System,Industry and Materials
Abstract:This paper proposes a new data stream outlier detection algorithm SODRNN based on reverse nearest neighbors. We deal with the sliding window...
1032
Authors: Hai Feng Li, Ning Zhang
Chapter 1: Transportation & Service Science
Abstract:Maximal frequent itemsets are one of several condensed representations of frequent itemsets, which store most of the information contained in...
21
Authors: Ji Guang Liu, Hai Yang Wang
Chapter 7: Other Related Topics
Abstract:This paper introduces a kind of fuzzy adaptive filtering algorithm. The whole process is divided into four steps. Plenty experimental...
1733
Authors: Shu Hua Ma, Jin Kuan Wang, Zhi Gang Liu, Hou Yan Jiang
Chapter 1: Applied Mechanics and Measurement Technology of Detection and Monitoring
Abstract:Data measured and collected by WSNs is often unreliable and a big amount of anomaly data exist. Detecting these anomaly in energy-constrained...
226
Authors: Yuan Qin
Chapter 4: Mathematical Analysis, Computer Science, Communication and Information Technologies
Abstract:With the development of computer network and rapid popularity of Internet, network information security has become the focus of safeguarding...
816