Research and Simulation of Queue Management Algorithms in Ad Hoc Networks Under DDoS Attack

Document Type

Article

Publication Date

2017

College/Unit

Statler College of Engineering and Mining Resources

Department/Program/Center

Lane Department of Computer Science and Electrical Engineering

Abstract

Concentrating on the influence of DDoS applied to ad hoc networks, we introduced three classic queue management algorithms: Drop-Tail, random early detection (RED), and random exponential marking (REM). We analyzed and compared the defensive abilities of these algorithms applied to ad hoc networks with NS2 under DDoS attack. The results showed that active queue management algorithms, such as REM and RED, exhibited stronger defensive abilities than the passive queue management algorithm Drop-Tail under medium- and small-scale DDoS attacks; however, under large-scale DDoS attack, all three algorithms exhibited insufficient defensive capabilities. This means that other defense schemes, such as network detection, must be integrated into security schemes to defeat DDoS attacks.

Source Citation

W. Wei, H. Song, H. Wang and X. Fan, "Research and Simulation of Queue Management Algorithms in Ad Hoc Networks Under DDoS Attack," in IEEE Access, vol. 5, pp. 27810-27817, 2017. doi: 10.1109/ACCESS.2017.2681684 keywords: {ad hoc networks;queueing theory;telecommunication network management;telecommunication security;small-scale DDoS attacks;large-scale DDoS attack;network detection;ad hoc networks;random exponential;active queue management algorithms;passive queue management algorithm;NS2;Ad hoc networks;Computer crime;Routing;Protocols;Wireless communication;Software algorithms;Media;DDoS;ad-hoc network;queue management algorithms;network simulation software;defense scheme}, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7876739&isnumber=7859429

Comments

W. Wei, H. Song, H. Wang and X. Fan, "Research and Simulation of Queue Management Algorithms in Ad Hoc Networks Under DDoS Attack," in IEEE Access, vol. 5, pp. 27810-27817, 2017. doi: 10.1109/ACCESS.2017.2681684 keywords: {ad hoc networks;queueing theory;telecommunication network management;telecommunication security;small-scale DDoS attacks;large-scale DDoS attack;network detection;ad hoc networks;random exponential;active queue management algorithms;passive queue management algorithm;NS2;Ad hoc networks;Computer crime;Routing;Protocols;Wireless communication;Software algorithms;Media;DDoS;ad-hoc network;queue management algorithms;network simulation software;defense scheme}, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7876739&isnumber=7859429

This document is currently not available here.

Share

COinS