Triple DoS: DDoS defence and traceback Online publication date: Sat, 19-Jul-2014
by Alex Doyal; Justin Zhan
International Journal of Information Privacy, Security and Integrity (IJIPSI), Vol. 1, No. 4, 2013
Abstract: Distributed denial of service (DDoS) attacks occur when a host of compromised systems are used to target a single system. This single system can be either an actual machine or a network resource. These attacks are prevalent and hard to deal with because they are distributed. They come from many machines, making them hard to trace and even harder to counter. There are also a host of tools available which make it easier for an attacker to launch a DDoS attack. This ubiquity is increasing the level of difficulty related to defending against these attacks. This paper proposes a mechanism, DDDoS, or triple DoS, to deal with DDoS attacks on the internet layer. There are registration and authentication protocols to connect clients and servers so that an unregistered client cannot access the network and flood it with traffic. The triple DoS service will be activated only when a DDoS attack is detected (using clustering), and it will ensure that registered clients and servers can always communicate. It includes a tracing mechanism to allow the originator of the DDoS attack to be identified.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information Privacy, Security and Integrity (IJIPSI):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com