Skip to main content
Log in

Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Owing to the increasing threat of malwares and attacks, the defense mechanism design of various attacks becomes an important issue. Currently, there are various kinds of malwares, such as computer viruses, Trojan-horses, spywares, adwares, worms, and zombies, etc. Attacks are like zero-day attack, black-hole attack, Denial of Service attacks, man-in-the-middle attack and so on. The above attacks will be threats to the computer systems. This article focuses on the defense mechanism for Distributed Denial of Service (DDoS) attacks. DDoS attacks use a lot of request packets or garbage packets to occupy network bandwidth and consume performance of the target host. If the attack target is a commercial website, DDoS attacks will cause transmission delay and more seriously they will deny web services. In this paper, we propose a Double Check Priority Queue structure that effectively mitigates the impact of DDoS attacks in order that normal users can still access services.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Belenky A, Ansari N (2003) On IP traceback. IEEE Commun Mag 41(7):142–153

    Article  Google Scholar 

  • Bi J, Liu B, Wu J, Shen Y (2009) Preventing IP source address spoofing: a two-level, state machine-based method. Tsinghua Sci Technol 14(4):413–422

    Article  Google Scholar 

  • Carl G, Kesidis G, Brooks RR, Rai S (2006) Denial-of-service attack-detection techniques. IEEE Int Comput 10(1):82–89

    Article  Google Scholar 

  • Chang RKC (2002) Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun Mag 40(10):42–51

    Article  Google Scholar 

  • Chen Y, Kwok Y-K, Hwang K (2005) MAFIC: adaptive packet dropping for cutting malicious flows to push back DDoS attacks. In: Proceedings of 25th IEEE international conference on distributed computing systems workshops 2005, June 2005

  • Gao Z, Ansari N (2005) Tracing cyber attacks from the practical perspective. IEEE Commun Mag 43(5):123–131

    Google Scholar 

  • Hilgenstieler E, Duarte EP Jr, Mansfield-Keeni G, Shiratori N (2010) Extensions to the source path isolation engine for precise and efficient log-based IP traceback. Comput Secur 29(4):383–392

    Article  Google Scholar 

  • Kim Y, Jo J-Y, Chao HJ, Merat F (2003) High-speed router filter for blocking TCP flooding under DDoS attack. In: Proceedings of the 2003 IEEE international performance, computing, and communications conference, Dec 2003, pp 183–190

  • Lin C-H, Liu J-C, Jiang F-C, Kuo C-T (2008) An Effective priority queue-based scheme to alleviate malicious packet flows from distributed DoS attacks. In: International conference on intelligent information hiding and multimedia signal processing, IIHMSP ’08, 15–17 Aug 2008, pp 1371–1374

  • Maciá-Fernández G, Rodríguez-Gómez RA, Díaz-Verdejo JE (2010) Defense techniques for low-rate DoS attacks against application servers. Comput Netw 54(15):2711–2727

    Article  MATH  Google Scholar 

  • Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput Commun Rev 34(2):39–54

    Article  Google Scholar 

  • Noureldien N (2002) Protecting web servers from DoS/DDoS flooding attacks: a technical overview. In: International conference on web-management for international organizations, Oct 2002

  • Qu Z-Y, Huang C-F, Liu N-N (2008) A novel two-step traceback scheme for DDoS attacks. In: second international symposium on intelligent information technology application, 20–22 Dec 2008, pp 879–883

  • Stefan A (2000) Intrusion detection systems: a survey and taxonomy. Technical report 99-15, Department of Computer Engineering, Chalmers University

  • Sudip M, Venkata Krishna P, Kiran IA, Navin S, Fredun S (2010) An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks. Comput Math Appl 60(2):294–306

    Article  MATH  Google Scholar 

  • Tao P, Christopher L, Kotagiri R (2007) Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Comput Surv 39(1)

  • Trostle J (2006) Protecting against distributed denial of service (DDoS) attacks using distributed filtering. Securecomm and workshops, pp 1–11

Download references

Acknowledgments

This work was supported in part by Taiwan National Science Council under grants NSC 99-2221-E-029-039-MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chu-Hsing Lin.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lin, CH., Lin, HY., Wu, TW. et al. Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues. J Ambient Intell Human Comput 4, 275–282 (2013). https://doi.org/10.1007/s12652-011-0091-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-011-0091-x

Keywords

Navigation