2011
DOI: 10.3837/tiis.2011.05.012
|View full text |Cite
|
Sign up to set email alerts
|

Robustness of RED in Mitigating LDoS Attack

Abstract: The Random Early Detection algorithm is widely used in the queue management mechanism of the router. We find that the parameters of the RED algorithm have a significant influence on the defense performance of the random early detection algorithm and discuss the robust of the algorithm in mitigating Low-rate Denial-of-Service attack in details. Simulation results show that the defense performance can be effectively improved by adjusting the parameters of min Q and max Q . Some suggestions are given for mitigati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Also, denial‐of‐service attack and replay attack resistances are important security requirements of WSN. Because the latter security requirements can be achieved by analyzing security model with Unified Modeling Language , using Random Early Detection algorithm with adjusted parameters , and applying secure protocol, we are focusing on the formal security requirements to find security techniques based on cryptographic techniques. The confidentiality and integrity of the communicating message can be achieved by symmetric algorithms, such as Data Encryption Standard and Advanced Encryption Standard .…”
Section: Introductionmentioning
confidence: 99%
“…Also, denial‐of‐service attack and replay attack resistances are important security requirements of WSN. Because the latter security requirements can be achieved by analyzing security model with Unified Modeling Language , using Random Early Detection algorithm with adjusted parameters , and applying secure protocol, we are focusing on the formal security requirements to find security techniques based on cryptographic techniques. The confidentiality and integrity of the communicating message can be achieved by symmetric algorithms, such as Data Encryption Standard and Advanced Encryption Standard .…”
Section: Introductionmentioning
confidence: 99%
“…This paper intends to suggest that BDMs should undergo an evasion evaluation as suggested in Gu et al . For example, a proactive evasion analysis is presented in Zhang et al on an existing technique for mitigating low‐rate denial‐of‐service (LDoS) attacks using random early detection (RED). The authors analyzed the current algorithm and looked at ways it could be subverted.…”
Section: Related Work and Backgroundmentioning
confidence: 99%
“…Mitigating botnets is an urgent task, because they are threatening the Internet seriously, through spam mails [12], denial of service attacks [13] [14], and so on. Finding the C&C server of botnets and taking them down is an effective method to mitigate IRC botnets and HTTP botnets.…”
Section: Related Workmentioning
confidence: 99%