Abstract
DDoS attack presents a very serious threat to the stability of the Internet. In this paper, we propose cost-optimized detection system location scheme based on the zero-one linear programming model. The performance of proposed model is evaluated based on a manually created network topology. From the evaluation results, we present that the total location cost increases exponentially according to the number of detection system, and the number of hop is reduced by adapting relative weights to the scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM Transactions (2002)
Chang, R.K.C.: Defending against Flooding-Based Distributed Denial-of-service Attacks: A Tutorial. IEEE Communications Magazine (October 2002)
Park, K., Lee, H.: On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets. In: SIGCOMM (2001)
Mukherjee, B., Heberlein, T.L., Levitt, K.N.: Network Intrusion Detection. IEEE Network 8(3), 26–41 (1994)
Jai, S.B., Jose, O.G., et al.: An architecture for intrusion detection using autonomous agents. In: Proceedings 14th Annual Computer Security Applications Conference (December 1998)
Nam, D.S., Youn, C.H., et al.: Tree-based Replica Location Scheme(TRLS) for Data Grids. In: IEEE ICON 2004, Singapore (2004)
Wolfson, O., Milo, A.: The Multicast Policy and Its Relationship to Replicated Data Placement. ACM Transactions on Database Systems 16(1), 181–205 (1991)
Fisher, M.L., Hochbaum, D.S.: Database Location in Computer Networks. Journal of ACM 27(4), 718–735 (1980)
Dowdy, L.W., Foster, D.V.: Comparative Models of the File Assignment Problem. ACM Computing Surveys 14(2), 287–313 (1982)
Kalpakis, K., Dasgupta, K., Wolfson, O.: Optimal Placement of Replicas in Trees with Read, Write, and Storage Costs. IEEE Transactions on Parallel and Distributed Systems (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nam, D.S., Jeong, S., Kim, W., Lee, SH., Lee, D.H., Park, E.K. (2004). A Cost-Optimized Detection System Location Scheme for DDoS Attack. In: Liew, KM., Shen, H., See, S., Cai, W., Fan, P., Horiguchi, S. (eds) Parallel and Distributed Computing: Applications and Technologies. PDCAT 2004. Lecture Notes in Computer Science, vol 3320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30501-9_105
Download citation
DOI: https://doi.org/10.1007/978-3-540-30501-9_105
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24013-6
Online ISBN: 978-3-540-30501-9
eBook Packages: Computer ScienceComputer Science (R0)