Browse > Article
http://dx.doi.org/10.3745/KTCCS.2013.2.3.125

A DDoS Attack Test, Analysis and Mitigation Method in Real Networks  

Yang, Jin-Seok (한국전자통신연구원 부설 연구소)
Kim, Hyoung-Chun (한국전자통신연구원 부설 연구소)
Chung, Tai-Myoung (성균관대학교 컴퓨터공학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.2, no.3, 2013 , pp. 125-132 More about this Journal
Abstract
In this paper, We send DDoS(Distributed Denial of Service) attack traffic to real homepages in real networks. We analyze the results of DDoS attack and propose mitigation method against DDoS Attacks. In order to analyze the results of DDoS Attacks, We group three defense level by administrative subjects: Top level defense, Middle level defense, Bottom level defense. Also We group four attack methods by feature. We describe the results that average of attack success rate on defense level and average of attack success rate on attack categories about 48ea homepages and 2ea exceptional cases. Finally, We propose mitigation method against DDoS attack.
Keywords
DDoS Attack; DDoS Attack Defense;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 2010 White paper of National Information Security, KISA, 2010.
2 2011 White paper of National Information Security, KISA, 2011.
3 3.4 DDoS Special report, Ahnlab, 2011.
4 Jin-tae Oh, et al., "A Novel Application-Layer DDoS Attack Detection Algorithm based on Client Intention", Journal of the KIISC(Korea Institute of Inforamtion Security and Cryptology), Vol.21, No.1, pp.39-52, 2011.   과학기술학회마을
5 Tai-jin Lee, et al., "Light-weight Defense Mechanisms for application layer DDoS Attacks in the Web Services", Journal of the KIISC, Vol.20, No.5, pp.99-110, 2010.   과학기술학회마을
6 Ki-Hun Jang, et al., "Smartphone DDoS Attack trend", Review of KIISC, Vol.21, No.5, pp.65-70, 2011.   과학기술학회마을
7 Yong-Hee Jeon, et al., "Classification of DDoS Attack and Response techniques", Review of KIISC, Vol.19, No.3, 2009.   과학기술학회마을
8 The lastest DDoS Attack and Defense techniques, Ahnlab, 2010.
9 Dustin D. Trammell & Todd Manning, "Simulating Distributed Denial of Service with BreakingPoint Storm CTM", White Paper, BreakPoint Systems.
10 Jelena Mirkovic, Peter Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms", ACM SIGCOMM Computer Communication Review, Vol.34, Issue 2. ISSN:0146-4833, April, 2004.
11 Wikipedia, http://ko.wikipedia.org/