• Login
    View Item 
    •   Home
    • Conference Proceedings
    • International Telemetering Conference
    • International Telemetering Conference Proceedings, Volume 49 (2013)
    • View Item
    •   Home
    • Conference Proceedings
    • International Telemetering Conference
    • International Telemetering Conference Proceedings, Volume 49 (2013)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UA Campus RepositoryCommunitiesTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalThis CollectionTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournal

    My Account

    LoginRegister

    About

    AboutUA Faculty PublicationsUA DissertationsUA Master's ThesesUA Honors ThesesUA PressUA YearbooksUA CatalogsUA Libraries

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Packet Simulation of Distributed Denial of Service (DDoS) Attack and Recovery

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    Name:
    ITC_2013_13-02-01.pdf
    Size:
    353.1Kb
    Format:
    PDF
    Download
    Author
    Khanal, Sandarva
    Lynton, Ciara
    Advisor
    Dean, Richard A.
    Affiliation
    Morgan State University
    Issue Date
    2013-10
    Keywords
    Distributed Denial of Service
    Network Simulation
    OPNET Modeler
    
    Metadata
    Show full item record
    Rights
    Copyright © held by the author; distribution rights International Foundation for Telemetering
    Collection Information
    Proceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.
    Publisher
    International Foundation for Telemetering
    Journal
    International Telemetering Conference Proceedings
    Abstract
    Distributed Denial of Service (DDoS) attacks have been gaining popularity in recent years. Most research developed to defend against DDoS attacks have focused on analytical studies. However, because of the inherent nature of a DDoS attack and the scale of a network involved in the attack, analytical simulations are not always the best way to study DDoS attacks. Moreover, because DDoS attacks are considered illicit, performing real attacks to study their defense mechanisms is not an alternative. For this reason, using packet/network simulators, such as OPNET Modeler, is the best option for research purposes. Detection of an ongoing DDoS attack, as well as simulation of a defense mechanism against the attack, is beyond the scope of this paper. However, this paper includes design recommendations to simulate an effective defense strategy to mitigate DDoS attacks. Finally, this paper introduces network links failure during simulation in an attempt to demonstrate how the network recovers during and following an attack.
    Sponsors
    International Foundation for Telemetering
    ISSN
    0884-5123
    0074-9079
    Additional Links
    http://www.telemetry.org/
    Collections
    International Telemetering Conference Proceedings, Volume 49 (2013)

    entitlement

     
    The University of Arizona Libraries | 1510 E. University Blvd. | Tucson, AZ 85721-0055
    Tel 520-621-6442 | repository@u.library.arizona.edu
    DSpace software copyright © 2002-2017  DuraSpace
    Quick Guide | Contact Us | Send Feedback
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.