{"title":"有线网络中DDOS攻击隔离RED算法的改进","authors":"I. Gupta, Sukhbeer Singh","doi":"10.1109/ICRITO.2016.7784982","DOIUrl":null,"url":null,"abstract":"Security is one of the critical issue in any network, in order to have better performance and efficiency, better security parameters must be imposed on it. In this research security model of the network has been explained, further it is analyzed that various attacks are possible in the network that gives threat to security and one of such attack is DDoS attack, framework of DDoS attack is discussed in detail. Also AQM technique like RED has been analyzed. RED queue has been implemented to detect and isolate DDoS attack. To achieve malicious node detection, Min and Max threshold values are used. Results show that network performance has been improved to a great extent in terms of metrics such as packet loss, jitter and throughput.","PeriodicalId":377611,"journal":{"name":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancement in RED algorithm for isolation of DDOS attack in wired network\",\"authors\":\"I. Gupta, Sukhbeer Singh\",\"doi\":\"10.1109/ICRITO.2016.7784982\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security is one of the critical issue in any network, in order to have better performance and efficiency, better security parameters must be imposed on it. In this research security model of the network has been explained, further it is analyzed that various attacks are possible in the network that gives threat to security and one of such attack is DDoS attack, framework of DDoS attack is discussed in detail. Also AQM technique like RED has been analyzed. RED queue has been implemented to detect and isolate DDoS attack. To achieve malicious node detection, Min and Max threshold values are used. Results show that network performance has been improved to a great extent in terms of metrics such as packet loss, jitter and throughput.\",\"PeriodicalId\":377611,\"journal\":{\"name\":\"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"volume\":\"145 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRITO.2016.7784982\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRITO.2016.7784982","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enhancement in RED algorithm for isolation of DDOS attack in wired network
Security is one of the critical issue in any network, in order to have better performance and efficiency, better security parameters must be imposed on it. In this research security model of the network has been explained, further it is analyzed that various attacks are possible in the network that gives threat to security and one of such attack is DDoS attack, framework of DDoS attack is discussed in detail. Also AQM technique like RED has been analyzed. RED queue has been implemented to detect and isolate DDoS attack. To achieve malicious node detection, Min and Max threshold values are used. Results show that network performance has been improved to a great extent in terms of metrics such as packet loss, jitter and throughput.