Corpus ID: 7965014

Modeling DDoS Attacks with IP Spoofing and Hop-Count Defense Measure Using OPNET Modeler

@inproceedings{Akhter2013ModelingDA,
  title={Modeling DDoS Attacks with IP Spoofing and Hop-Count Defense Measure Using OPNET Modeler},
  author={Shahid Akhter and J. Myers and Chris Bowen and Stephen Ferzetti and P. Belko and Vasil Hnatyshin},
  year={2013}
}
  • Shahid Akhter, J. Myers, +3 authors Vasil Hnatyshin
  • Published 2013
  • Distributed Denial of Service (DDoS) attacks continue to plague today's Internet. The variety and ingenuity of such attacks requires network security analysts to perpetually develop more robust forms of attack identification and prevention. UDP flood is one of the simplest to deploy DDoS attacks. It is based on the idea of overwhelming the receiver with a huge amount of traffic causing congestion and preventing legitimate services. Such attacks are often launched together with IP spoofing which… CONTINUE READING
    2 Citations

    Figures from this paper

    References

    SHOWING 1-5 OF 5 REFERENCES
    Hop-count filtering: an effective defense against spoofed DDoS traffic
    • 514
    • PDF
    Pi: a path identification mechanism to defend against DDoS attacks
    • 465
    • PDF
    On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network
    • 32
    • PDF
    Apache Exploit Leaves P to 65% of All Websites Vulnerable
    • http://nakedsecurity.sophos.com/2011/08/26/apacheexploit-leaves-up-to-65-of-all-websites-vulnerable/, last accessed 4/18/13
    • 2011
    Internet Denial of Service: Attack and Defense Mechanisms
    • Prentice Hall, 2005, ISBN- 10: 0131475738, ISBN-13: 978-0131475731
    • 2005