Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks†
Faculty of Department of Information Management, Kun Shan University, 710 Tainan, Taiwan
*
Author to whom correspondence should be addressed.
†
This paper is an extended version of our paper published in 2019 IEEE Eurasia Conference on IOT, Communication and Engineering (IEEE ECICE 2019), National Formosa University, Yunlin, Taiwan, 3–6 October, 2019.
Computers 2019, 8(4), 88; https://doi.org/10.3390/computers8040088
Received: 31 October 2019 / Revised: 26 November 2019 / Accepted: 28 November 2019 / Published: 4 December 2019
(This article belongs to the Special Issue Selected Papers from IIKII 2019 Conferences in Computers)
Most existing approaches for solving the distributed denial-of-service (DDoS) problem focus on specific security mechanisms, for example, network intrusion detection system (NIDS) detection and firewall configuration, rather than on the packet routing approaches to defend DDoS threats by new flow management techniques. To defend against DDoS attacks, the present study proposes a modified particle swarm optimization (PSO) scheme based on an IP traceback (IPTBK) technique, designated as PSO-IPTBK, to solve the IP traceback problem. Specifically, this work focuses on analyzing the detection of DDoS attacks to predict the possible attack routes in a distributed network. In the proposed approach, the PSO-IPTBK identifies the source of DDoS attacks by reconstructing the probable attack routes from collected network packets. The performance of the PSO-IPTBK algorithm in reconstructing the attack route was investigated through a series of simulations using OMNeT++ 5.5.1 and the INET 4 Framework. The results show that the proposed scheme can determine the most possible route between the attackers and the victim to defend DDoS attacks.
View Full-Text
Keywords:
DDoS; particle swarm optimization; IP traceback; OMNeT++; attack route
▼
Show Figures
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited
MDPI and ACS Style
Lin, H.-C.; Wang, P.; Lin, W.-H. Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks. Computers 2019, 8, 88. https://doi.org/10.3390/computers8040088
AMA Style
Lin H-C, Wang P, Lin W-H. Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks. Computers. 2019; 8(4):88. https://doi.org/10.3390/computers8040088
Chicago/Turabian StyleLin, Hsiao-Chung; Wang, Ping; Lin, Wen-Hui. 2019. "Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks" Computers 8, no. 4: 88. https://doi.org/10.3390/computers8040088
Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.
Search more from Scilit