Development of the Algorithm for Protection against DDoS-Attacks of Type Pulse Wave
Title | Development of the Algorithm for Protection against DDoS-Attacks of Type Pulse Wave |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Chugunkov, Ilya V., Fedorov, Leonid O., Achmiz, Bela Sh., Sayfullina, Zarina R. |
Conference Name | 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) |
Date Published | jan |
Publisher | IEEE |
ISBN Number | 978-1-5386-4340-2 |
Keywords | Botnet, Communication networks, composability, Computer crime, DDoS, DDoS attack detection, DDoS Attack Prevention, DPI, firewall, firewalls, Human Behavior, Internet, IP networks, Metrics, Network, network technologies, pubcrawl, pulse wave type DDoS-attack prevention, resilience, Resiliency, Servers, telecommunication traffic, traffic classifier |
Abstract | Protection from DDoS-attacks is one of the most urgent problems in the world of network technologies. And while protect systems has algorithms for detection and preventing DDoS attacks, there are still some unresolved problems. This article is devoted to the DDoS-attack called Pulse Wave. Providing a brief introduction to the world of network technologies and DDoS-attacks, in particular, aims at the algorithm for protecting against DDoS-attack Pulse Wave. The main goal of this article is the implementation of traffic classifier that adds rules for infected computers to put them into a separate queue with limited bandwidth. This approach reduces their load on the service and, thus, firewall neutralises the attack. |
URL | https://ieeexplore.ieee.org/document/8317090 |
DOI | 10.1109/EIConRus.2018.8317090 |
Citation Key | chugunkov_development_2018 |
- internet
- traffic classifier
- telecommunication traffic
- Servers
- Resiliency
- resilience
- pulse wave type DDoS-attack prevention
- pubcrawl
- network technologies
- Network
- Metrics
- IP networks
- botnet
- Human behavior
- firewalls
- firewall
- dpi
- DDoS Attack Prevention
- DDoS attack detection
- DDoS
- Computer crime
- composability
- Communication networks