Research Journal of Applied Sciences

Year: 2015
Volume: 10
Issue: 2
Page No. 49 - 53

Systems of Protection of Computer Networks from Distributed Network Attacks to Denial of Service

Authors : Gulmira A. Shangytbayeva, Bahytzhan S. Akhmetov, Mikolaj P. Karpinski, Roza N. Beysembekova and Erbol A. Ospanov

References

Aleksander, M.A., M.P. Karpinski and U.O. Yatsykovska, 2012. Features of denial-of-service attacks in information systems. Inform. Math. Meth. Simulat., 2: 129-133.

Baba, T. and S. Matsuda, 2002. Tracing network attacks to their sources. IEEE Internet Comput., 6: 20-26.
CrossRef  |  

Bhuyan, M.H., D.K. Bhattacharyya and J.K. Kalita, 2015. An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recognit. Lett., 51: 1-7.
CrossRef  |  Direct Link  |  

Bu, T., S. Norden and T. Woo, 2004. Trading resiliency for security: Model and algorithms. Proceedings of the 12th IEEE International Conference on Network Protocols, October 5-8, 2004, IEEE Computer Society, Washington DC. USA., pp: 218-227.

Burch, H. and B. Cheswick, 2000. Tracing anonymous packets to their approximate source. Proceedings of the 14th USENIX Conference on System Administration, December 3-8, 2000, New Orleans, Louisiana, USA., pp: 319-327.

Dean D., M. Franklin and A. Stubblefield, 2001. An algebraic approach to IP traceback. Proceedings of the Network and Distributed System Security Symposium, February 8-9, 2001, Sand Diego, CA., USA., pp: 3-12.

Elliott, J., 2000. Distributed denial of service attacks and the zombie ant effect. IT Professional, 2: 55-57.
CrossRef  |  Direct Link  |  

Goodrich, M.T., 2008. Probabilistic packet marking for large-scale IP traceback. IEEE/ACM Trans. Network., 16: 15-24.
CrossRef  |  

Hussain, A., J. Heidemann and C. Papadopoulos, 2003. A framework for classifying denial of service attacks. Proceedings of the Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, August 25-29, 2003, Karlsruhe, Germany, pp: 99-110.

Ioannidis, J. and S.M. Bellovin, 2002. Implementing pushback: Router-based defense against DDoS attacks. Proceedings of the 9th Symposium Network and Distributed System Security, February 6-8, 2002, San Diego, California, USA., pp: 1-12.

John, D.H., 1998. An analysis of security incidents on the internet. Ph.D. Thesis, Ph.D. Thesis, Carnegie Mellon Univerisity, Pennsylvania.

Karpinski, M.P., 2011. Modeling network traffic computer network in implementation attacks such as DOS/DDOS. Information Security, American Psychological Association, Ethical Standards of Psychologists, Washington, DC., USA., pp: 143-146.

Klimenko, I.A., 2002. A method of dynamic routing with support for required level of quality of service in mobile networks without a fixed infrastructure. Problems Inform. Control: SAT Sci., 15: 102-112.

Law, T.K.T., D.K.Y. Yau and J.C.S. Lui, 2005. You can run, but you can't hide: An effective statistical methodology to trace back DDos attackers. IEEE Trans. Parallel Distrib. Syst., 16: 799-813.
CrossRef  |  

Li, M., M. Li and X. Jiang, 2008. DDoS attacks detection model and its application. WSEAS Trans. Comput., 7: 1159-1168.
Direct Link  |  

Nicholas, K. and S. Gulmira, 2015. Architecture and program realization of system of detection of network attacks to denial of service. Proceedings of the International Conference on Global Issues in Multidisciplinary Academic Research, January 05-06, Dubai, UAE, pp: 55-55.

Park, K. and H. Lee, 2000. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. Computer Science Technical Reports No. 00-013, Department of Computer Sciences, Purdue University, West Lafayette, IN., August 2000.

Park, K. and H. Lee, 2001. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. Proceedings of the Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, August 27-31, 2001, San Diego, CA., USA., pp: 15-26.

Savage, S., D. Wetherall, A. Karlin and T. Anderson, 2000. Practical network support for IP traceback. Proceedings of the Conference on Applications, Technologies, Architectures and Protocols for Computer Communication, August 28-September 1, 2000, Stockholm, Sweden, pp: 295-306.

Snoeren, A.C., C. Partridge, L.A. Sanchez, Jones, C.E., F. Tchakountio, S.T. Kent and W.T. Strayer, 2001. Hash-based IP traceback. Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures and Protocols for Computer Communication, August 27-31, 2001, San Diego, California, USA., pp: 3-14.

Song, D. and A. Perrig, 2000. Advanced and authenticated marking schemes for IP traceback. Technical Reports UCB/CSD-00-1107, Computer Science Department, University of California, Berkeley.

Song, D.X. and A. Perrig, 2001. Advanced and authenticated marking schemes for IP traceback. Proceedings of the 20th Annual Joint Conference on IEEE Computer and Communications Societies, April 22-26, 2001, Anchorage, AK., USA., pp: 878-886.

Stone, R., 2000. Centertrack: An IP overlay network for tracking DoS floods. Proceedings of the 9th USENIX Security Symposium, August 14-17, 2000, Denver, Colorado, USA., pp: 107-118.

Wang, H., D. Zhang and K.G. Shin, 2002. Detecting SYN flooding attacks. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies. June 23-27, 2002, New York, USA., pp: 1530-1539.

Wang, J. and A. Chien, 2003. Using overlay networks to resist denial-of-service attacks. Proceedings of the 10th ACM Conference on Computer and Communication Security, October 27-30, 2003, Washington, DC., USA -.

Wu, Y., Z. Zhao, F. Bao and R.H. Deng, 2014. Software puzzle: A countermeasure to resource-inflated denial-of-service attacks. IEEE Trans. Inform. Forensics Secur., 10: 168-177.
CrossRef  |  

Yang, Z.X., X.L. Qin, W.R. Li, Y.J. Yang, 2014. A DDoS detection approach based on CNN in cloud computing. Applied Mech. Mater., 513: 579-584.
Direct Link  |  

Zhukov, I.A. and I. Davydenko, 2008. Distributed traffic management in mobile networks. Electron. Control Syst., 2: 161-167.

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved