Petr Blazek, Tomas Gerlich, Zdenek Martinasek, Jakub Frolka
{"title":"Linux过滤工具防范DDoS攻击的比较","authors":"Petr Blazek, Tomas Gerlich, Zdenek Martinasek, Jakub Frolka","doi":"10.1109/TSP.2018.8441309","DOIUrl":null,"url":null,"abstract":"Every year, the intensity and quantity of Distributed Denial of Service (DDoS) attacks realized is incessantly increasing, that is confirmed by companies such as Kaspersky, Imperva or Verisign. Moreover, this reality is also confirmed by the published losses of victims. The popularity of these attacks is mainly trigger for the simplicity of realization therefore the actual costs of the attack realization are cheap. The main goal of this article is to compare open source tools for network data processing. This research is realized in order to identify the most effective tool including the settings that will be implemented into DDoS mitigation system. The final system provide adaptive network filtering based on the decomposition of network traffic and filtering utilizing commodity servers.","PeriodicalId":383018,"journal":{"name":"2018 41st International Conference on Telecommunications and Signal Processing (TSP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Comparison of Linux Filtering Tools for Mitigation of DDoS Attacks\",\"authors\":\"Petr Blazek, Tomas Gerlich, Zdenek Martinasek, Jakub Frolka\",\"doi\":\"10.1109/TSP.2018.8441309\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Every year, the intensity and quantity of Distributed Denial of Service (DDoS) attacks realized is incessantly increasing, that is confirmed by companies such as Kaspersky, Imperva or Verisign. Moreover, this reality is also confirmed by the published losses of victims. The popularity of these attacks is mainly trigger for the simplicity of realization therefore the actual costs of the attack realization are cheap. The main goal of this article is to compare open source tools for network data processing. This research is realized in order to identify the most effective tool including the settings that will be implemented into DDoS mitigation system. The final system provide adaptive network filtering based on the decomposition of network traffic and filtering utilizing commodity servers.\",\"PeriodicalId\":383018,\"journal\":{\"name\":\"2018 41st International Conference on Telecommunications and Signal Processing (TSP)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 41st International Conference on Telecommunications and Signal Processing (TSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TSP.2018.8441309\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 41st International Conference on Telecommunications and Signal Processing (TSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TSP.2018.8441309","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparison of Linux Filtering Tools for Mitigation of DDoS Attacks
Every year, the intensity and quantity of Distributed Denial of Service (DDoS) attacks realized is incessantly increasing, that is confirmed by companies such as Kaspersky, Imperva or Verisign. Moreover, this reality is also confirmed by the published losses of victims. The popularity of these attacks is mainly trigger for the simplicity of realization therefore the actual costs of the attack realization are cheap. The main goal of this article is to compare open source tools for network data processing. This research is realized in order to identify the most effective tool including the settings that will be implemented into DDoS mitigation system. The final system provide adaptive network filtering based on the decomposition of network traffic and filtering utilizing commodity servers.