184
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Modelling and simulations for DDoS attacks mitigation in identifier–locator split network

, , , &
Pages 2541-2552 | Received 17 Jul 2012, Accepted 06 Dec 2012, Published online: 07 Mar 2013

References

  • P. Ammann, D. Wijesekera, and S. Kaushik, Scalable, Graph-Based Network Vulnerability Analysis, Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, 2002, pp. 217–224.
  • BGP Report [EB/OL]. Available at http://bgp.potaroo.net/.
  • C.Y. Chen, K.D. Chang, and H.C. Chao, Transaction pattern based anomaly detection algorithm for IP multimedia subsystem, IEEE Trans. Inform. Forensics Security 6(1) (2011), pp. 152–161. doi: 10.1109/TIFS.2010.2095845
  • J.M. Chen, K.P. Wang, and L.D. Chou, DDoS attacks defense based on active networks, J. Internet Technol. 7(2) (2006), pp. 205–214.
  • D. Clark, R. Braden, A. Falk, and V. Pingali, FARA: Reorganizing the Addressing Architecture, Proceedings of the ACM SIGCOMM Workshop on Future Directions in Network Architecture (FDNA), Karlsruhe, Germany, August 2003, pp. 313–321.
  • W.H. Cunningham, Optimal attack and reinforcement of a network, J. ACM 32(3) (1985), pp. 549–561. doi: 10.1145/3828.3829
  • C. Dhinakaran, D. Nagamalai, and J.K. Lee, Multilayer approach to defend phishing attacks, J. Internet Technol. 11(3) (2010), pp. 417–425.
  • P. Dong, Y. Qin, and H.K. Zhang, Research on universal network supporting pervasive services, Acta Electron. Sin. 35(4) (2007), pp. 599–606.
  • D. Farinacci, V. Fuller, D. Meyer, and D. Lewis, Locator/ID Separation Protocol (LISP), Internet Draft, draft-farinacci-lisp-15.txt, July 2011.
  • M.Y. Hsieh, Y.M. Huang, and H.C. Chao, Adaptive security design with malicious node detection in cluster-based sensor networks, Comput. Commun. 30(11–12) (2007), pp. 2385–2400. doi: 10.1016/j.comcom.2007.04.008
  • S. Jha, O. Sheyner, and J. Wing, Two Formal Analyses of Attack Graphs, Proceedings of the 15th IEEE Workshop on Computer Security Foundations (CSFW-15), Nova Scotia, Canada, 24–26 June 2002, pp. 49–63.
  • J. Kong, M. Mieza, J. Shu, C. Yoedhana, M. Gerla, and S. Lu, Random flow network modeling and simulations for DDoS attack mitigation, IEEE Int. Conf. Commun.1 (2003), pp. 487–491.
  • R. Koodli, IP Address Location Privacy and Mobile IPv6: Problem Statement. RFC 4882, May 2007.
  • Y. Liu, M. Wan, H.K. Zhang, S.D. Zhang, and H.H. Chao, Research on the Data Reconstruction Method Based on Identifier/Locator Separation Architecture, J. Internet Technol. 12(4) (2011), pp. 531–539.
  • V. Mehta, C. Bartzis, H. Zhu, E. Clarke, and J. Wing, Ranking Attack Graphs. Proceedings of the 9th International Conference on Recent Advances in Intrusion Detection (RAiD 2006), Hamburg, Germany, 20–22 September 2006, LNCS 4219, pp. 127–144.
  • M.S. Obaidat and F. Zarai, Novel algorithm for secured mobility and IP traceability for WLAN networks, J. Convergence 3(2) (2012), pp. 1–8.
  • T. Okagawa, K. Nishida, and A. Miura, A Proposed Routing Procedure in IP2, Vehicular Technology Conference, Orlando, FL, 6–9 October, Vol. 3, 2003, pp. 2083–2087.
  • C. Phillips and L.P. Swiler, A Graph-Based System for Network-Vulnerability Analysis, Proceedings of the 1998 Workshop on New Security Paradigms, Charlottesville, VA, 1998, pp. 71–79.
  • J. Saltzer, On the Naming and Binding of Network Destinations. RFC 1498, August 1993.
  • M.-Y. Su, An intelligent internet key exchange protocol resistant to denial-of-service attacks, J. Internet Technol. 11(5) (2010), pp. 681–690.
  • L.P. Swiler, C. Phillips, D. Ellis, and S. Chakerian, Computer-Attack Graph Generation Tool, Proceedings of the DARPA Information Survivability Conference & Exposition II. DISCEX’ 01, 2001, Anaheim, CA, 12–14 June 2001, Vol. 2, pp. 307–321.
  • Y. Wang, M. Xian, J. Liu, and G. Wang, Study of network security evaluation based on attack graph model, J. Commun. 28(3) (2007), pp. 28–34.
  • H. Yumiba, K. Imai, and M. Yabusaki, IP-based IMT network platform, IEEE Pers. Commun. Magazine 8(5) (2001), pp. 18–23. doi: 10.1109/98.960336
  • H. Zhang and W. Su, Fundamental research on the architecture of new network-universal network and pervasive services, Acta Electron. Sin. 35(4) (2007), pp. 593–598.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.