dc.contributor.author | Kongshavn, Madeleine | |
dc.contributor.author | Haugerud, Hårek | |
dc.contributor.author | Yazidi, Anis | |
dc.contributor.author | Maseng, Torleiv | |
dc.contributor.author | Hammer, Hugo Lewi | |
dc.date.accessioned | 2021-02-01T17:47:13Z | |
dc.date.accessioned | 2021-03-10T11:06:37Z | |
dc.date.available | 2021-02-01T17:47:13Z | |
dc.date.available | 2021-03-10T11:06:37Z | |
dc.date.issued | 2020-02-22 | |
dc.identifier.citation | Kongshavn, Haugerud H, Yazidi A, Maseng T, Hammer HL. Mitigating DDoS using weight-based geographical clustering. Concurrency and Computation. 2020;32(11) | en |
dc.identifier.issn | 1532-0626 | |
dc.identifier.issn | 1532-0634 | |
dc.identifier.uri | https://hdl.handle.net/10642/9966 | |
dc.description.abstract | Distributed denial of service (DDoS) attacks have for the last two decades been among the greatest threats facing the internet infrastructure. Mitigating DDoS attacks is a particularly challenging task as an attacker tries to conceal a huge amount of traffic inside a legitimate traffic flow. This article proposes to use data mining approaches to find unique hidden data structures which are able to characterize the normal traffic flow. This will serve as a mean for filtering illegitimate traffic under DDoS attacks. In this endeavor, we devise three algorithms built on previously uncharted areas within mitigation techniques where clustering techniques are used to create geographical clusters in regions which are likely to contain legitimate traffic. We argue through extensive experimental results that establishing clusters around this narrative is a superior solution to clustering algorithms which rely on bitwise distances between IP addresses. In addition, the DDoS filtering algorithm is deployed in a virtual Linux environment using Nfqueue and tested in a simulated real‐life DDoS attack. | en |
dc.language.iso | en | en |
dc.publisher | Wiley | en |
dc.relation.ispartofseries | Concurrency and Computation: Practice and Experience;Volume 32, Issue 11, e5679 | |
dc.subject | Address clustering | en |
dc.subject | Anomaly intrusion detections | en |
dc.subject | Clustering techniques | en |
dc.subject | Mitigation techniques | en |
dc.subject | Mitigating DDoS attacks | en |
dc.title | Mitigating DDoS using weight-based geographical clustering | en |
dc.type | Journal article | en |
dc.type | Peer reviewed | en |
dc.date.updated | 2021-02-01T17:47:13Z | |
dc.description.version | publishedVersion | en |
dc.identifier.doi | https://doi.org/10.1002/cpe.5679 | |
dc.identifier.cristin | 1821406 | |
dc.source.journal | Concurrency and Computation | |