Tunghai University Institutional Repository:Item 310901/22412
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4247411      Online Users : 444
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/22412


    Title: Using adaptive bandwidth allocation approach to defend DDoS attacks??
    Authors: Lin, C.-H., Liu, J.-C., Huang, H.-C., Yang, T.-C.
    Contributors: Department of Computer Science, Tunghai University
    Keywords: Bandwidth;DDoS attack;DoS attack;IP spoofing;Network simulator;Priority queue
    Date: 2008-04-24
    Issue Date: 2013-05-21T09:05:31Z (UTC)
    Publisher: Busan
    Abstract: Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or resources of a targeted system. Although it is not possible to exempt entirely from denial of service or distributed denial of service attacks, we can limit the malicious user by controlling the traffic flow. In the paper, we propose to monitor the traffic pattern in order to alleviate distributed denial of service attacks. A bandwidth allocation policy will be adopted to assign normal users to a high priority queue and suspected attackers to a low priority queue. Simulations conducted in network simulator of our proposed priority queue-based scheme shows its effectiveness in blocking attack traffic while maintaining constant flows for legitimate traffic. ? 2008 IEEE.
    Relation: Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008 , art. no. 4505716 , pp. 176-181
    Appears in Collections:[Department of Computer Science and Information ] Conference Papers

    Files in This Item:

    File SizeFormat
    index.html0KbHTML201View/Open


    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback