Title: DDoS: design, implementation and analysis of automated model

Authors: Udaya Kiran Tupakula, Vijay Varadharajan, Ashok Kumar Gajam, Sunil Kumar Vuppala, Pandalaneni Naga Srinivasa Rao

Addresses: Information and Networked Systems Security Research, Division of ICS, Department of Computing, Macquarie University, NSW-2109, Australia. ' Information and Networked Systems Security Research, Division of ICS, Department of Computing, Macquarie University, NSW-2109, Australia. ' Information and Networked Systems Security Research, Division of ICS, Department of Computing, Macquarie University, NSW-2109, Australia. ' Department of Electronics and Computer Engineering, Indian Institute of Technology Roorkee (IITR), Roorkee, Uttarakhand 247667, India. ' Hewlett Packard, 450 Alexandra Road, 119960, Singapore

Abstract: Earlier, we have proposed an automated model to minimise DDoS attacks in single ISP domain and extended the model to multiple ISP domains. Our approach has several advanced features to minimise DDoS attacks in the internet. The focus of this paper is twofold: firstly, to present a detailed description of the design and implementation of the proposed model and second to discuss and analyse the extensive set of results obtained from the implementation and simulations. We describe the prototype implementation of our automated model using NetProwler network intrusion detection system and HP OpenView Network Node Manager. We will also discuss the performance analysis of our model on a large scale using NS2 tool. Both prototype and simulation test results confirm that our approach offers a promising solution against DDoS problem in the internet and the model can be implemented in real time with minor modifications to the existing tools.

Keywords: denial of service; DDoS attacks; distributed DoS; automated models; intrusion detection; network management; network security; wireless networks; mobile networks; simulation.

DOI: 10.1504/IJWMC.2007.013797

International Journal of Wireless and Mobile Computing, 2007 Vol.2 No.1, pp.72 - 85

Published online: 28 May 2007 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article