Skip to main content

A Cost-Optimized Detection System Location Scheme for DDoS Attack

  • Conference paper
Parallel and Distributed Computing: Applications and Technologies (PDCAT 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3320))

  • 1048 Accesses

Abstract

DDoS attack presents a very serious threat to the stability of the Internet. In this paper, we propose cost-optimized detection system location scheme based on the zero-one linear programming model. The performance of proposed model is evaluated based on a manually created network topology. From the evaluation results, we present that the total location cost increases exponentially according to the number of detection system, and the number of hop is reduced by adapting relative weights to the scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM Transactions (2002)

    Google Scholar 

  2. Chang, R.K.C.: Defending against Flooding-Based Distributed Denial-of-service Attacks: A Tutorial. IEEE Communications Magazine (October 2002)

    Google Scholar 

  3. Park, K., Lee, H.: On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In: SIGCOMM (2001)

    Google Scholar 

  4. Mukherjee, B., Heberlein, T.L., Levitt, K.N.: Network Intrusion Detection. IEEE Network 8(3), 26–41 (1994)

    Article  Google Scholar 

  5. Jai, S.B., Jose, O.G., et al.: An architecture for intrusion detection using autonomous agents. In: Proceedings 14th Annual Computer Security Applications Conference (December 1998)

    Google Scholar 

  6. Nam, D.S., Youn, C.H., et al.: Tree-based Replica Location Scheme(TRLS) for Data Grids. In: IEEE ICON 2004, Singapore (2004)

    Google Scholar 

  7. Wolfson, O., Milo, A.: The Multicast Policy and Its Relationship to Replicated Data Placement. ACM Transactions on Database Systems 16(1), 181–205 (1991)

    Article  MathSciNet  Google Scholar 

  8. Fisher, M.L., Hochbaum, D.S.: Database Location in Computer Networks. Journal of ACM 27(4), 718–735 (1980)

    Article  MathSciNet  MATH  Google Scholar 

  9. Dowdy, L.W., Foster, D.V.: Comparative Models of the File Assignment Problem. ACM Computing Surveys 14(2), 287–313 (1982)

    Article  Google Scholar 

  10. Kalpakis, K., Dasgupta, K., Wolfson, O.: Optimal Placement of Replicas in Trees with Read, Write, and Storage Costs. IEEE Transactions on Parallel and Distributed Systems (2001)

    Google Scholar 

  11. http://www.cplex.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nam, D.S., Jeong, S., Kim, W., Lee, SH., Lee, D.H., Park, E.K. (2004). A Cost-Optimized Detection System Location Scheme for DDoS Attack. In: Liew, KM., Shen, H., See, S., Cai, W., Fan, P., Horiguchi, S. (eds) Parallel and Distributed Computing: Applications and Technologies. PDCAT 2004. Lecture Notes in Computer Science, vol 3320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30501-9_105

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30501-9_105

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24013-6

  • Online ISBN: 978-3-540-30501-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics