Skip to main content

NEW QoS CONCEPT for Protecting Network Resources

  • Conference paper
  • First Online:
Image Processing and Communications Challenges 8 (IP&C 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 525))

Included in the following conference series:

Abstract

Distributed Denial of Service attacks are one of the main problem of computer networks. There is no any method for protecting network user from source of the attack. Such attack could block network resources for many hours, while existing methods for protecting networks are using only firewalls and IDS/IPS mechanisms. Such solutions are not enough nowadays. This article presents the concept of Quality of Services methods and some well know network protocols for preparing network to fight with the DDoS attacks. This proposed concept lets the administrator to protect their network resources during the attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. http://www.w3schools.com/browsers/browsers_stats

  2. Cert advisory ca-1996-21 tcp syn flooding and ip spoofing attacks, November 2000. http://www.cert.org/advisories/CA-1996-21.html

  3. Cert advisory ca-1996-01 udp port denial-of-service attack, September 1997. http://www.cert.org/advisories/CA-1996-01.html

  4. Apiecionek, Ł., Czerniak, J.M., Zarzycki, H.: Protection tool for distributed denial of services attack. In: Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds.) BDAS 2014. CCIS, vol. 424, pp. 405–414. Springer, Heidelberg (2014). doi:10.1007/978-3-319-06932-6_39

    Chapter  Google Scholar 

  5. Czerniak, J.M., Apiecionek, Ł., Zarzycki, H., Ewald, D.: Proposed CAEva simulation method for evacuation of people from a buildings on fire. In: Atanassov, K.T., et al. (eds.) Novel Developments in Uncertainty Representation and Processing. AISC, vol. 401, pp. 315–326. Springer, Heidelberg (2016). doi:10.1007/978-3-319-26211-6_27

    Chapter  Google Scholar 

  6. Czerniak, J., Dobrosielski, W., Apiecionek, Ł., Ewald, D.: Representation of a trend in ofn during fuzzy observance of the water level from the crisis control center. In: Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, Annals of Computer Science and Information Systems, pp. 443–447. IEEE (2015)

    Google Scholar 

  7. Dickerson, J.E., Juslin, J., Koukousoula, O., Dickerson, J.A.: Fuzzy intrusion detection. In: IFSA World Congress and 20th NAFIPS International Conference, vol. 3, pp. 1506–1510. IEEE (2001)

    Google Scholar 

  8. Kozik, R., Choraś, M., Renk, R., Hołubowicz, W.: Semi-unsupervised machine learning for anomaly detection in HTTP traffic. In: Burduk, R., Jackowski, K., Kurzyński, M., Woźniak, M., Żołnierek, A. (eds.) CORES 2015. AISC, vol. 403, pp. 767–775. Springer, Heidelberg (2016). doi:10.1007/978-3-319-26227-7_72

    Chapter  Google Scholar 

  9. Moor, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. (TOCS) 24(2), 115–139 (2006)

    Article  Google Scholar 

  10. Piechowiak, M., Zwierzykowski, P.: The evaluation of multicast routing algorithms with delay constraints in mesh networks. In: 8th IEEE, IET International Symposium on Communication Systems, Networks and Digital Signal Processing CSNSDP, Pozna’n, Poland (2012)

    Google Scholar 

  11. Piechowiak, M., Zwierzykowski, P.: The evaluation of unconstrained multicast routing algorithms in ad-hoc networks. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2012. CCIS, vol. 291, pp. 344–351. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31217-5_36

    Chapter  Google Scholar 

  12. Rocky, K., Chang, C.: Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun. Mag. 40, 42–51 (2002)

    Google Scholar 

  13. Schuba, C.L., Krsul, I., Huhn, M.G., Spafford, E.H., Sundaram, A.: Analysis of a denial of service attack on tcp. Computer Science Technical Reports. Paper 1327 (1996). http://docs.lib.purdue.edu/cstech/1327

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lukasz Apiecionek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Apiecionek, L., Czerniak, J.M., Ewald, D. (2017). NEW QoS CONCEPT for Protecting Network Resources. In: Choraś, R. (eds) Image Processing and Communications Challenges 8. IP&C 2016. Advances in Intelligent Systems and Computing, vol 525. Springer, Cham. https://doi.org/10.1007/978-3-319-47274-4_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47274-4_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47273-7

  • Online ISBN: 978-3-319-47274-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics