Active Detecting DDoS Attack Approach based on Entropy Measurement for the Next Generation Instant Messaging App on Smartphones

Author(s):  
Hsing-Chung Chen ◽  
Shyi-Shiun Kuo
2010 ◽  
Vol 19 (03n04) ◽  
pp. 205-238 ◽  
Author(s):  
VICTORIA BELTRAN ◽  
JOSEP PARADELLS

Presence information was the key enabler to the great success of instant messaging applications. First, this information was limited to simple binary states such as online, offline or busy. However, this is, currently, evolving towards a much more generic, flexible concept to include all context that allows users or applications to adapt and control communications in a more efficient and personalized manner. Presence paves the way for the deployment of advanced communication services and is therefore a key component in the Next-Generation Networks (NGNs). These networks aim to unify fixed and mobile networks in order to provide users with global connectivity to always-on multimedia services. The main barrier to the implantation of next-generation presence-based services is the great amount of traffic involved in the distribution of presence information across domains. We study two strategies described in IETF drafts and one novel solution for reducing inter-domain presence traffic. We present the analytical formulas that calculate the traffic for the three strategies. Building on the analytical results, we analyze the factors that have impact on these strategies and study the suitability of each one under different conditions.


2012 ◽  
Vol 542-543 ◽  
pp. 1275-1281
Author(s):  
Wei Wei ◽  
Ying Jie Xia ◽  
Ya Bo Dong

Security is an important consideration in next generation Internet, where Distributed Denial of Service (DDoS) attack is still a serious threat, especially when Internet of Things is taken into account. To defend against DDoS, capability based Traffic Validation Architecture (TVA) is an excellent candidate. However, there are some shortcomings which make it not so practical, e.g., it has large capability overhead and some DoS attacks could escape from it. To overcome these problems, we proposed the autonomic system based architecture: ASTVA, which created and verified capability using autonomic system as the basic defense unit. In ASTVA, two kinds of sub-capabilities were provided and serveral system security levels were given by mixing the two kinds of sub-capabilities; several key parameters were adjusted dynamically to enhance system flexibility; and an anti-shrew function was added to TVA to make it more robust against low-rate DoS attacks. Finally, we gave out several simulation tests and the results show that ASTVA is more robust and flexible than TVA and is more practical to real world security.


2004 ◽  
Vol 171 (4S) ◽  
pp. 389-389
Author(s):  
Manoj Monga ◽  
Ramakrishna Venkatesh ◽  
Sara Best ◽  
Caroline D. Ames ◽  
Courtney Lee ◽  
...  

1996 ◽  
Vol 41 (1) ◽  
pp. 52-53
Author(s):  
Lisa C. McGuire
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document