Skip to main content
Log in

An approach for detecting and preventing DDoS attacks in campus

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

Nowadays, Denial of Service (DoS) attacks have become a major security threat to networks and the Internet. Therefore, even a naive hacker can launch a large-scale DoS attack to the victim from providing Internet services. This article deals with the evaluation of the Snort IDS in terms of packet processing performance and detection. This work describes the aspect involved in building campus network security system and then evaluates the campus network security risks and threats, mainly analyses the attacks DoS and DDoS, and puts forward new approach for Snort campus network security solutions. The objective is to analyze the functional advantages of the solution, deployment and configuration of the open source based on Snort intrusion detection system. The evaluation metrics are defined using Snort namely comparison between basic rules with new ones, available bandwidth, CPU loading and memory usage.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Meena, D. and Jadon, R.S., Distributed denial of service attacks and their suggested defense remedial approaches, Int. J. Adv. Res. Comput. Sci. Manage. Stud., 2014, vol. 2, no. 4, pp. 183–197.

    Google Scholar 

  2. Patrikakis, C., Masikos, M., and Zouraraki, O., Distributed denial of service attacks, Int. Protoc. J., 2004, vol. 7, no. 4, pp. 183–197.

    Google Scholar 

  3. Computer Emergency Response Team CERT. DDoS Overview and Incident Response Guide, Computer Emergency Response Team, 2014.

    Google Scholar 

  4. Ling, Y., Gu, Y., and Wei, G., Detect SYN Flooding Attack in Edge Routers, Int. J. Secur. Appl., 2009, vol. 3, no. 1, pp. 31–45.

    Google Scholar 

  5. Choi, Y. seo., Kim, I.-K., Oh, J.-T., and Jang, J.-S., Aigg threshold based http get flooding attack detection, Proc. of the 13th International Workshop on Information Security Applications, Jeju Island, 2012, vol. 7, pp. 270–284.

    Google Scholar 

  6. Peng, T., Leckie, C., and Ramamohanarao, K., Survey of network-based defense mechanisms countering the DoS and DDoS problems, J. ACM Comput. Surv., 2007, vol. 39, no. 1, pp. 1–42.

    Article  Google Scholar 

  7. Mirkovic, J., Martin, J., and Reihe, P., A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. Technical Report #020018, Computer Science Department University of California, Los Angeles, 2014.

    Google Scholar 

  8. Lanke, N.M. and Raja Jacob, C.H., Detection of DDOS attacks using Snort Detection International, J. Emerging Eng. Res. Technol., 2014, vol. 2, no. 9, pp. 13–17.

    Google Scholar 

  9. Zeng, X., Peng, X., Li, M., Xu, H., and Jin, S., Research on an effective approach against DDoS attacks, Int. Conf. Res. Challenges Comput. Sci., 2009, pp. 21–23.

    Google Scholar 

  10. Alomari, E., Gupta, B.B., and Karuppayah, S., Botnet-based distributed denial of service (DDoS) attacks on web servers: Classification and Art, Int. J. Comput. Appl., 2012, vol. 49, no. 7, pp. 24–32.

    Google Scholar 

  11. Zargar, S.T., Joshi, J., and Tipper, D., A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks, IEEE Commun. Surv. Tutorials, 2013, vol. 5, no. 4, pp. 2046–2069.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mehdi Merouane.

Additional information

The article is published in the original.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Merouane, M. An approach for detecting and preventing DDoS attacks in campus. Aut. Control Comp. Sci. 51, 13–23 (2017). https://doi.org/10.3103/S0146411616060043

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411616060043

Keywords

Navigation