DDoS Attack detection method and mitigation using pattern of the flow

Ahmad Sanmorino, Setiadi Yazid

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

25 Citations (Scopus)

Abstract

Distributed denial-of-service attack (DDoS Attack) is one of the types of attacks that use multiple hosts as attacker against a system. There is a difference between Distributed Denial-of-Service (DDoS Attack) and Denial-of-Service (DoS Attack). DDoS attacks are distributed, meaning spread using multiple hosts, while the DoS attack is one-on-one. DoS attacks requires a powerful host, either from the resource or operating system used to carry out the attack. In this study, we discuss how to handle DDoS attacks in the form of detection method based on the pattern of flow entries and handling mechanism using layered firewall. Tests carried out using three scenario that is simulations on normal network environment, unsecured network, and secure network. Then, we analyze the simulations result that has been done. The method used successfully filtering incoming packet, by dropped packets from the attacker when DDoS attack happen, while still be able to receive packets from legitimate hosts.

Original languageEnglish
Title of host publication2013 International Conference of Information and Communication Technology, ICoICT 2013
Pages12-16
Number of pages5
DOIs
Publication statusPublished - 2013
Event2013 International Conference of Information and Communication Technology, ICoICT 2013 - Bandung, Indonesia
Duration: 20 Mar 201322 Mar 2013

Publication series

Name2013 International Conference of Information and Communication Technology, ICoICT 2013

Conference

Conference2013 International Conference of Information and Communication Technology, ICoICT 2013
Country/TerritoryIndonesia
CityBandung
Period20/03/1322/03/13

Keywords

  • distributed denial-of-service attack
  • simulation

Fingerprint

Dive into the research topics of 'DDoS Attack detection method and mitigation using pattern of the flow'. Together they form a unique fingerprint.

Cite this