[go: up one dir, main page]

Skip to main content

A New Active DDoS Defense System Based on Automatic Learning

  • Conference paper
Advances in Computer Science – ASIAN 2005. Data Management on the Web (ASIAN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3818))

Included in the following conference series:

  • 475 Accesses

Abstract

Active DDoS Defense System (ADDS) compensates the deficiencies of isolated defenses made by routers, firewalls or kernel defense programs, and ADDS implements technique of net traffics analysis to control routers for optimizing net traffics distribution. The use of neural network made ADDS the capacity of automatic learning, and ADDS filters DDoS attack traffics automatically according the intensity of attacks in each router; the use of accelerated arithmetic of iteration made ADDS the capacity of quick response.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Savage, S., Wetherall.: Network Support for IP Traceback. IEEE/ACM Transactions on Networking 9 (2001)

    Google Scholar 

  2. Zhao, X., Peng, Z., Wang, Y.: The Technical Tutorial of Network Security, pp. 70–72, 147-159. National Defence Industry Press, Bei–Jing (2002)

    Google Scholar 

  3. Zhang, S., Dasgupta, P.: Hardened Networks. PHD Proposal, Arizona State University, Tempe (2002)

    Google Scholar 

  4. Steven, M., Bellovin.: ICMP Traceback Messages. In: Work in progress, Internet draft bellovin-itrace-2000 (2000)

    Google Scholar 

  5. Thomas, W., Doeppner, P., Klein, N., Andrew, K.: Using Router Stamping to Identify the Source of IP Packets. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, pp. 184–189 (2000)

    Google Scholar 

  6. Stefan, S., David, W., Anna, K., Tom, A.: Practical Network Support for IP Traceback. In: Proceedings of ACM SIGCOMM (2000)

    Google Scholar 

  7. William, S.: Network Security Essentials-Applications and Standards, 2nd edn. Tsing Hua Univercity Press, Bei-ing (2002)

    Google Scholar 

  8. Peluso, L., Cotroneo, D., Romano, S.P., Ventre, G.: An Active Security System against DoS Attacks (2001)

    Google Scholar 

  9. Kurose, J.F., Ross, K.W.: Computer Networking: A Top-Down Approach. In: Featuring the Internet, 2nd edn. (2002)

    Google Scholar 

  10. Martin, T., Hagan, Howard, B., Demuth, M., Beale, H.: Neural Network Design, pp. 168–196. China Machine Press, Bei-Jing (2002)

    Google Scholar 

  11. Katerina, Argyraki, David, R., Cheriton: Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks. In: USENIX 2005 Annual Technical Conference, pp. 135–148 (2005)

    Google Scholar 

  12. David, K., Yau, Y., John, C., Lui, S., Liang, F., Yam, Y.: Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server-Centric Router Throttles. IEEE/ACM Transaction on Networking (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tian, J., Peng, M., Liu, Y. (2005). A New Active DDoS Defense System Based on Automatic Learning. In: Grumbach, S., Sui, L., Vianu, V. (eds) Advances in Computer Science – ASIAN 2005. Data Management on the Web. ASIAN 2005. Lecture Notes in Computer Science, vol 3818. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596370_22

Download citation

  • DOI: https://doi.org/10.1007/11596370_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30767-9

  • Online ISBN: 978-3-540-32249-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics