TY - GEN
T1 - DDoS Attack detection method and mitigation using pattern of the flow
AU - Sanmorino, Ahmad
AU - Yazid, Setiadi
PY - 2013
Y1 - 2013
N2 - Distributed denial-of-service attack (DDoS Attack) is one of the types of attacks that use multiple hosts as attacker against a system. There is a difference between Distributed Denial-of-Service (DDoS Attack) and Denial-of-Service (DoS Attack). DDoS attacks are distributed, meaning spread using multiple hosts, while the DoS attack is one-on-one. DoS attacks requires a powerful host, either from the resource or operating system used to carry out the attack. In this study, we discuss how to handle DDoS attacks in the form of detection method based on the pattern of flow entries and handling mechanism using layered firewall. Tests carried out using three scenario that is simulations on normal network environment, unsecured network, and secure network. Then, we analyze the simulations result that has been done. The method used successfully filtering incoming packet, by dropped packets from the attacker when DDoS attack happen, while still be able to receive packets from legitimate hosts.
AB - Distributed denial-of-service attack (DDoS Attack) is one of the types of attacks that use multiple hosts as attacker against a system. There is a difference between Distributed Denial-of-Service (DDoS Attack) and Denial-of-Service (DoS Attack). DDoS attacks are distributed, meaning spread using multiple hosts, while the DoS attack is one-on-one. DoS attacks requires a powerful host, either from the resource or operating system used to carry out the attack. In this study, we discuss how to handle DDoS attacks in the form of detection method based on the pattern of flow entries and handling mechanism using layered firewall. Tests carried out using three scenario that is simulations on normal network environment, unsecured network, and secure network. Then, we analyze the simulations result that has been done. The method used successfully filtering incoming packet, by dropped packets from the attacker when DDoS attack happen, while still be able to receive packets from legitimate hosts.
KW - distributed denial-of-service attack
KW - simulation
UR - http://www.scopus.com/inward/record.url?scp=84883479321&partnerID=8YFLogxK
U2 - 10.1109/ICoICT.2013.6574541
DO - 10.1109/ICoICT.2013.6574541
M3 - Conference contribution
AN - SCOPUS:84883479321
SN - 9781467349925
T3 - 2013 International Conference of Information and Communication Technology, ICoICT 2013
SP - 12
EP - 16
BT - 2013 International Conference of Information and Communication Technology, ICoICT 2013
T2 - 2013 International Conference of Information and Communication Technology, ICoICT 2013
Y2 - 20 March 2013 through 22 March 2013
ER -