{"title":"Some experimental results about security solutions against DDoS attacks","authors":"E. Petac, Abdel-Rahman Alzoubaidi, P. Duma","doi":"10.1109/ISSCS.2013.6651193","DOIUrl":null,"url":null,"abstract":"One of the most currently important security problems on the Internet network is Distributed Denial of Service (DDoS) attacks. There are many solutions [1], [2] for analysis and protection against DDoS attacks at the terminal equipment level (system client, server system), but there is still no universally valid solution for any type of DDoS attack, at the network level. Our proposed method is based on the results of informational correlation [3] to the statistical control study, considering the three partitions of traffic flow defined in [4]. In the second part of the paper we present the technologies and the software solutions we used for the development and implementation of a monitoring application, identification and filtering of DDoS attacks. The theoretical issues that concern the proposed method are presented in the third part of the paper. The application testing made in a virtual and in a real environment is presented in the fourth part of the paper.","PeriodicalId":260263,"journal":{"name":"International Symposium on Signals, Circuits and Systems ISSCS2013","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Symposium on Signals, Circuits and Systems ISSCS2013","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSCS.2013.6651193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
One of the most currently important security problems on the Internet network is Distributed Denial of Service (DDoS) attacks. There are many solutions [1], [2] for analysis and protection against DDoS attacks at the terminal equipment level (system client, server system), but there is still no universally valid solution for any type of DDoS attack, at the network level. Our proposed method is based on the results of informational correlation [3] to the statistical control study, considering the three partitions of traffic flow defined in [4]. In the second part of the paper we present the technologies and the software solutions we used for the development and implementation of a monitoring application, identification and filtering of DDoS attacks. The theoretical issues that concern the proposed method are presented in the third part of the paper. The application testing made in a virtual and in a real environment is presented in the fourth part of the paper.