Next Article in Journal
MoDAr-WA: Tool Support to Automate an MDA Approach for MVC Web Application
Next Article in Special Issue
Dynamic Boundary of P-Set and Intelligent Acquisition for Two Types of Information Fusion
Previous Article in Journal
Neural Net-Based Approach to EEG Signal Acquisition and Classification in BCI Applications
Open AccessArticle

Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks

Faculty of Department of Information Management, Kun Shan University, 710 Tainan, Taiwan
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in 2019 IEEE Eurasia Conference on IOT, Communication and Engineering (IEEE ECICE 2019), National Formosa University, Yunlin, Taiwan, 3–6 October, 2019.
Computers 2019, 8(4), 88; https://doi.org/10.3390/computers8040088
Received: 31 October 2019 / Revised: 26 November 2019 / Accepted: 28 November 2019 / Published: 4 December 2019
(This article belongs to the Special Issue Selected Papers from IIKII 2019 Conferences in Computers)
Most existing approaches for solving the distributed denial-of-service (DDoS) problem focus on specific security mechanisms, for example, network intrusion detection system (NIDS) detection and firewall configuration, rather than on the packet routing approaches to defend DDoS threats by new flow management techniques. To defend against DDoS attacks, the present study proposes a modified particle swarm optimization (PSO) scheme based on an IP traceback (IPTBK) technique, designated as PSO-IPTBK, to solve the IP traceback problem. Specifically, this work focuses on analyzing the detection of DDoS attacks to predict the possible attack routes in a distributed network. In the proposed approach, the PSO-IPTBK identifies the source of DDoS attacks by reconstructing the probable attack routes from collected network packets. The performance of the PSO-IPTBK algorithm in reconstructing the attack route was investigated through a series of simulations using OMNeT++ 5.5.1 and the INET 4 Framework. The results show that the proposed scheme can determine the most possible route between the attackers and the victim to defend DDoS attacks. View Full-Text
Keywords: DDoS; particle swarm optimization; IP traceback; OMNeT++; attack route DDoS; particle swarm optimization; IP traceback; OMNeT++; attack route
Show Figures

Figure 1

MDPI and ACS Style

Lin, H.-C.; Wang, P.; Lin, W.-H. Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks. Computers 2019, 8, 88.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop