An Approach to Increase Bandwidth Utilization under Suspected Flood Attack

نویسندگان

  • Raman Singh
  • Harish Kumar
  • R. K. Singla
  • Won Kim
  • Chulyun Kim
  • Arthur Callado
  • Carlos Kamienski
  • Géza Szabó
  • Balázs Péter Gero
  • Judith Kelner
  • Stênio Fernandes
  • Djamel Sadok
  • Atul Kant Kaushik
چکیده

Bandwidth is very crucial and limited resource available, so it should be properly utilized. Network congestion occurs when a link or node is carrying large amount of data in case of flood attack and quality of service deteriorates. Effects of flood attack include queuing delay, packet loss or the blocking of new connections. As a consequence incremental increases in offered load leads to either small increase in network throughput, or to an actual reduction in network throughput. Modern networks use congestion control and avoidance techniques to avoid such congestion collapses. One of widely used queuing algorithm is Drop Tail which is used in most

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DDA: An Approach to Handle DDoS (Ping Flood) Attack

Distributed denial of service attack (DDoS) is an attempt by malicious hosts to overload website, network, e-mail servers, applications, network resources, bandwidth, etc. Globally DDoS attacks affected four out of ten organizations (around 41 %) over the past few years. Challenges involved in taking counter measures against DDoS attacks are network infrastructure, identifying legitimate traffi...

متن کامل

TCP SYN Flood Sensor for Internet Backbone

Network security has always been a critical concern of not only businesses and governments but also of single computer users. Increased dependency on telecommunication and particularly on Internet has made us more vulnerable to malicious cyber activities. The exponential growth of Internet has unveiled a much damaging aspect of DoS attacks. The victim is flooded with attack traffic caused by va...

متن کامل

CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack

The challenging number is used for the detection of Spoofing attack. The IP Spoofing is considered to be one of the potentially brutal attack which acts as a tool for the DDoS attack which is considered to be a major threat among security problems in today’s internet. These kinds of attack are extremely severe. They bring down business of company drastically. DDoS attack can easily exhaust the ...

متن کامل

Broadcasting at the Critical Threshold in Peer-to-Peer Networks

Peer-to-peer (P2P) applications often require periodic broadcasting of messages from a single node to the entire network. For example, a node may wish to inform the network the availability of a new service or resource, or a node may want to query the network for a particular file or service. In unstructured P2P networks, a simple solution to this problem is to use a “flood-fill” algorithm. In ...

متن کامل

Flood risk zoning due to climate change under RCP 8.5 scenario using hydrologic model SWAT in Gis (Azarshahr basin)

In the present time, with the increase of industrial activities and the neglected environmental issues, the effects of climate change have become more evident and poses this phenomenon as a global difficult. Increasing the probability of occurrence of extreme climatic events such as flood and increasing the frequency and intensity of the effects of climate change. The northwest of the country i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012