About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Ad Hoc Networks and Tools for IT. 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6–7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings

Research Article

The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack

Download(Requires a free EAI acccount)
2 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-98005-4_5,
        author={Vukosi Rikhotso and Mthulisi Velempini},
        title={The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack},
        proceedings={Ad Hoc Networks and Tools for IT. 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6--7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings},
        proceedings_a={ADHOCNETS \& TRIDENTCOM},
        year={2022},
        month={3},
        keywords={Detection Distributed Denial of Service Performance evaluation},
        doi={10.1007/978-3-030-98005-4_5}
    }
    
  • Vukosi Rikhotso
    Mthulisi Velempini
    Year: 2022
    The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack
    ADHOCNETS & TRIDENTCOM
    Springer
    DOI: 10.1007/978-3-030-98005-4_5
Vukosi Rikhotso1, Mthulisi Velempini1,*
  • 1: University of Limpopo, Private Bag X1106
*Contact email: mvelempini@gmail.com

Abstract

The study evaluates two Distributed Denial of Service (DDoS) attacks detection schemes, the Cloud based and the Netplumber. The schemes are evaluated in terms of CPU and memory utilization. The main objective is to identify the better algorithm with a view of enhancing the schemes. The related work on detection algorithms was reviewed. The schemes are evaluated in a Software defined and Cognitive Radio (SD-CRN) Network environment. An early detection and lightweight detection schemes is desirable.

The desirable algorithm detects the attack within the least number of packets. It also consumes less memory and the least amount of CPU time on average. The study uses a statistical approach with the covariance matrix to evaluate the effect of the attack on the SD-CRN controller. SD-CRN introduces a programmable, dynamic, adaptable, manageable and cost-effective network architecture.

DDoS attacks deplete the network bandwidth or exhausts the victim’s resources. Researchers have proposed a number of defence mechanisms (such as attack prevention, trackback, reaction, detection, and characterization) in an endeavour to address the effects of the DDoS attacks. Unfortunately, the incidents of the attacks are on the rise. However, the results of this evaluation show that the Netplumber is the promising algorithm.

Keywords
Detection Distributed Denial of Service Performance evaluation
Published
2022-03-27
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-98005-4_5
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL