Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 2349-8161
Online ISSN: 2349-817X


  About ISEJ
  Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Contact us
 
  For Authors
  Guidelines for Contributors
Online Submission
Statement of Ethics and Responsibilities
Review Policies
Transfer of Copyright
Archiving Policy
Call for Papers
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
Journal of Multimedia Processing and Technologies (JMPT)
International Journal of Web Application (IJWA)

 

 
Information Security Education Journal (ISEJ)
 

Solution for the Security Attack Using Distributed Denial of Services
Ivan Georgiev and Kamelia Nikolova
Faculty of Telecommunications at Technical University of Sofia 8 Kl. Ohridski Blvd Sofia 1000, Bulgaria
Abstract: Distributed Denial of Service is a normal type of security attack for which network protection is deployed. Network resources are aimed by this attack which is now studied. We have used a solution named as DenfensePro for safeguarding the network resources. We have tested the efficiency of the introduced solution for network resources protection.
Keywords: Distributed Denial of Service, Attacks, Network Resources, Data Center Solution for the Security Attack Using Distributed Denial of Services
DOI:https://doi.org/10.6025/isej/2020/7/1/9-15
Full_Text   PDF 504 KB   Download:   226  times
References:

[1] Osanaiye, O., Choo, K.R., Dlodlo, M. (2016). Distributed Denial of Service (DDoS) Resilience in Cloud: Review and Conceptual Cloud DDoS Mitigation Framework, Journal of Network and Computer Applications, vol. 67, p 147-165, May 2016.
[2] Prasad, K., Reddy, A., Rao, K. (2014). DoS and DDoS Attacks: Defense, Detection and Traceback Mechanisms - A Survey, Global Journal of Computer Science and Technology: (E) Network, Web & Security, 14 (7), Ver. 1.0, p 15-32, 2014.
[3] Wang, B., Zheng, Y., Lou, W., Hou, Y. T. (2015). DDoS Attack Protection in the Era of Cloud Computing and Software- Defined Networking, Computer Networks, 81, p 308-319, 2015.
[4] Nunes, I., Schardong, F., Schaeffer-Filho, A. (2017). BDI2DoS: An Application Using Collaborating BDI Agents to Combat DDoS Attacks, Journal of Network and Computer Applications, vol. 84, p 14-24, 2017.
[5] Anstee, D., Bowen, P., Chui, C.F., Sockrider, G. (2017). Worldwide Infrastructure Security Report, Arbor Networks Special Report, Vol. XII, Arbor Networks, 2017. (www.arbornetworks.com) [6] Radware, DDoS Handbook, 2015.
[7] Shameli-Sendi, A., Pourzandi, M., Fekih-Ahmed, M., Cheriet, M. (2015). Taxonomy of Distributed Denial of Service Mitigation Approaches for Cloud Computing, Journal of Network and Computer Applications, vol. 58, p 165-179, 2015.
[8] Dzurenda, P., Martinasek, Z., Malina, L. (2015). Network Protection Against DDoS Attacks, Intern. Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems, 4 (1), p 8-14, 2015.
[9] Zhou, W., Jia, W., Wen, S., Xiang, Y., Zhou, W. (2014). Detection and Defense of Application-Layer DDoS Attacks in Backbone Web Traffic, Future Generation Computer Systems, vol. 38, p 36-46, 2014.
[10] Radware, DefensePro User Guide, January 2016.
[11] Berry, I., Roman, T., Adams, L., Pasnak, J.P., Conner, J., Scheck, R.. Braun, A. (2017). The Cacti Manual, The Cacti Group, 2017.


Copyright 2013 socio.org.uk