Skip to main content

QoS Concept for Protecting Network Resources - A Case Study

  • Conference paper
  • First Online:
Image Processing and Communications Challenges 9 (IP&C 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 681))

Included in the following conference series:

  • 640 Accesses

Abstract

Distributed Denial of Service attacks remain one of the main problems of computer networks and to date there is no method for protecting network user from the source of the attack. Such attack can block network resources provided by the servers for many hours. In order to prevent such cases, it is recommended to use firewalls and IDS/IPS mechanisms. Unfortunately, they are not solving the problem. An alternative solution is the concept of Quality of Services methods, which are not flawless. While they provide the possibility for the administrators to protect their network resources during the attack, there are no guidelines concerning the mechanism of their functioning. This paper analyzes a case study of the proposed method of using QoS for network protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Apiecionek, L., Czerniak, J.M., Zarzycki, H.: Protection tool for distributed denial of services attack. In: Beyond Databases, Architectures and Structures, BDAS 2014, vol. 424, pp. 405–414 (2014)

    Google Scholar 

  2. Czerniak, J.M., Zarzycki, H., Ewald, D.: AAO as a new strategy in modeling and simulation of constructional problems optimization. Simul. Model. Pract. Theory 76, 22–33 (2017). http://www.sciencedirect.com/science/article/pii/S1569190X17300709

  3. Dyczkowski, K.: A less cumulative algorithm of mining linguistic browsing patterns in the world wide web (2007)

    Google Scholar 

  4. Dyczkowski, K., Wygralak, M.: On triangular norm-based generalized cardinals and singular fuzzy sets. Fuzzy Sets Syst. 133(2), 211–226 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  5. Moor, D., Shannon, C., Brown, D., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. (TOCS) 24(2), 115–139 (2006)

    Article  Google Scholar 

  6. Rocky, K., Chang, C.: Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun. Mag. 40, 42–51 (2002)

    Google Scholar 

  7. Schuba, C.L., Krsul, I., Huhn, M.G., Spafford, E.H., Sundaram, A.: Analysis of a denial of service attack on TCP. Computer Science Technical Reports, Paper 1327 (1996). http://Docs.Lib.Purdue.Edu/Cstech/1327

  8. Stachowiak, A., Dyczkowski, K., Wojtowicz, A., Zywica, P., Wygralak, M.: A bipolar view on medical diagnosis in OvaExpert system (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ɓukasz Apiecionek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Apiecionek, Ɓ., Czerniak, J.M. (2018). QoS Concept for Protecting Network Resources - A Case Study. In: Choraƛ, M., Choraƛ, R. (eds) Image Processing and Communications Challenges 9. IP&C 2017. Advances in Intelligent Systems and Computing, vol 681. Springer, Cham. https://doi.org/10.1007/978-3-319-68720-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68720-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68719-3

  • Online ISBN: 978-3-319-68720-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics