• norsk
    • English
  • English 
    • norsk
    • English
  • Login
View Item 
  •   Home
  • Fakultet for teknologi, kunst og design (TKD)
  • TKD - Institutt for informasjonsteknologi
  • View Item
  •   Home
  • Fakultet for teknologi, kunst og design (TKD)
  • TKD - Institutt for informasjonsteknologi
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Mitigating DDoS using weight-based geographical clustering

Kongshavn, Madeleine; Haugerud, Hårek; Yazidi, Anis; Maseng, Torleiv; Hammer, Hugo Lewi
Journal article, Peer reviewed
Published version
Thumbnail
View/Open
cpe.5679.pdf (1.377Mb)
URI
https://hdl.handle.net/10642/9966
Date
2020-02-22
Metadata
Show full item record
Collections
  • TKD - Institutt for informasjonsteknologi [1036]
Original version
Kongshavn, Haugerud H, Yazidi A, Maseng T, Hammer HL. Mitigating DDoS using weight-based geographical clustering. Concurrency and Computation. 2020;32(11)   https://doi.org/10.1002/cpe.5679
Abstract
Distributed denial of service (DDoS) attacks have for the last two decades been among the greatest threats facing the internet infrastructure. Mitigating DDoS attacks is a particularly challenging task as an attacker tries to conceal a huge amount of traffic inside a legitimate traffic flow. This article proposes to use data mining approaches to find unique hidden data structures which are able to characterize the normal traffic flow. This will serve as a mean for filtering illegitimate traffic under DDoS attacks. In this endeavor, we devise three algorithms built on previously uncharted areas within mitigation techniques where clustering techniques are used to create geographical clusters in regions which are likely to contain legitimate traffic. We argue through extensive experimental results that establishing clusters around this narrative is a superior solution to clustering algorithms which rely on bitwise distances between IP addresses. In addition, the DDoS filtering algorithm is deployed in a virtual Linux environment using Nfqueue and tested in a simulated real‐life DDoS attack.
Publisher
Wiley
Series
Concurrency and Computation: Practice and Experience;Volume 32, Issue 11, e5679
Journal
Concurrency and Computation

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit
 

 

Browse

ArchiveCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDocument TypesJournalsThis CollectionBy Issue DateAuthorsTitlesSubjectsDocument TypesJournals

My Account

Login

Statistics

View Usage Statistics

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit