Impact of DDoS Attacks on Different Services Using Various AQM Techniques
Arshdeep Singh1 , Lakhvinder Kaur2 , Kulwinder Singh3
Section:Research Paper, Product Type: Journal Paper
Volume-4 ,
Issue-4 , Page no. 149-155, Apr-2016
Online published on Apr 27, 2016
Copyright © Arshdeep Singh, Lakhvinder Kaur , Kulwinder Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Arshdeep Singh, Lakhvinder Kaur , Kulwinder Singh, “Impact of DDoS Attacks on Different Services Using Various AQM Techniques,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.149-155, 2016.
MLA Style Citation: Arshdeep Singh, Lakhvinder Kaur , Kulwinder Singh "Impact of DDoS Attacks on Different Services Using Various AQM Techniques." International Journal of Computer Sciences and Engineering 4.4 (2016): 149-155.
APA Style Citation: Arshdeep Singh, Lakhvinder Kaur , Kulwinder Singh, (2016). Impact of DDoS Attacks on Different Services Using Various AQM Techniques. International Journal of Computer Sciences and Engineering, 4(4), 149-155.
BibTex Style Citation:
@article{Singh_2016,
author = {Arshdeep Singh, Lakhvinder Kaur , Kulwinder Singh},
title = {Impact of DDoS Attacks on Different Services Using Various AQM Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {149-155},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=877},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=877
TI - Impact of DDoS Attacks on Different Services Using Various AQM Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Arshdeep Singh, Lakhvinder Kaur , Kulwinder Singh
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 149-155
IS - 4
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1543 | 1410 downloads | 1436 downloads |
Abstract
With the rapid development of network technology, distributed denial of service (DDoS) attacks become one of the most important issues. Distributed Denial of Service (DDoS) attacks generates enormous packets by a large number of agents and can easily exhaust the computing and communication resources of a victim within a short period of time. So congestion control mechanism is one of the key that keeps any network efficient and reliable for the users. Many mechanisms were projected in the literature over theses years for the efficient control of congestion that occur in the network. Active Queue Management (AQM) is one such mechanism which provides better control in the recent years. The focus of this work is to study the behaviors of various queuing algorithms such as Drop Tail, Fair Queuing (FQ), Stochastic Fair Queuing (SFQ), Deficit Round Robin (DRR) and Random Early Detection (RED) using ns-2 as a simulation environment.
Key-Words / Index Term
DDoS, AQM, FQ, SFQ, DDR and RED
References
[1] K. Lee, J. Kim, K. H. Kwon, Y. Han, and S. Kim , "DDoS attack detection method using cluster analysis", Elsevier, Expert System with Applications, Vol.34, 2008, pp.1659-1665.
[2] M. Nabeshima, and K. Yata , “Performance improvement of active queue management with per-flow scheduling" ,IEEE Proc.-Commun., Vol. 152, No. 6, 2005.
[3] B. Braden, D. Clark, J. Crowcroft, B. Davie, S. Deering, D. Estrin, S. Floyd, V. Jacobson, G. Minshall, C. Partridge, L., Peterson, K. Ramakrishnan, S. Shenker, J. Wroclawski, and L. Zhang, "Recommendation on queue management and congestion avoidance in the Internet" . RFC2309, 1998.
[4] V. Santhi, and A. M. Natarajan, “A New Approach to Active Queue Management for TCP with ECN”, IEEE 2009 First International Conference on Advanced Computing, ISSN. 2377-6927, 2009, pp. 76-81.
[5] G. Pibiri, C. M. Goldrick, and M. Huggard , "Using Active Queue Management to Enhance Performance in IEEE802.11", 2009.
[6] Basant Kuamr Verma and Binod Kumar2, "An Improved Weighted Clustering for Ad-hoc Network Security New", International Journal of Computer Sciences and Engineering, Volume-03, Issue-03, Page No (51-55), Mar -2015, E-ISSN: 2347-2693
[7] Singh, Umesh Kumar, et al. "An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)." International Journal of Computer Science and Information Security, Volume-9, Noi-4 (2011): 106-110.
[8] S. Floyd and V. Jacobson, “Random early detection gateways for congestion avoidance,” ACM/IEEE Transaction on Networking, Vol. 1, 1993, pp. 397-413.
[9] G. A. Ramachandra, R. Banu and G. F. A. Ahammed, “Analyzing Marking Mod RED Active Queue Management Scheme on TCP Applications”, International Conference on Information and Network Technology, Vol. 37, 2012, pp. 251-257.
[10] F. Lau, R. H. Stuart, and S. H. Michael,., "Distributed Denial of Service Attacks," in Proceedings of 2000 IEEE International Conference on Systems, Man, and Cybernetics, Nashville, TN, Vol.3, 2000, pp.2275-2280.
[11] http://nms.csail.mit.edu/6.829-f06/lectures/bruce-queue.pdf
[12] M. Shreedhar, G. Varghese, E_cient Fair Queuing Using De_cit Round Robin, IEEE/ACM Transactions on Networking, Vol.4, No.3, June 1996.
[13] C. Semiria, “Supporting Differentiated Service Classes: Queue Scheduling Disciplines”, Juniper Networks, Inc.
[14] S. Kumar, A. Bhandari, A. L. Sangal and K. K. Saluja, “Queuing Algorithms Performance against Buffer Size and Attack Intensities”, Global Journal of Business Management and Information Technology. Volume 1, No. 2, 2011, pp. 141-157