IDEAS home Printed from https://ideas.repec.org/a/igg/jisp00/v11y2017i4p29-46.html
   My bibliography  Save this article

Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2

Author

Listed:
  • Manish Kumar

    (Punjabi University, Department of Computer Engineering, Patiala, India)

  • Abhinav Bhandari

    (Punjabi University, Department of Computer Engineering, Patiala, India)

Abstract

As the world is getting increasingly dependent on the Internet, the availability of web services has been a key concern for various organizations. Application Layer DDoS (AL-DDoS) attacks may hamper the availability of web services to the legitimate users by flooding the request queue of the web server. Hence, it is pertinent to focus fundamentally on studying the queue scheduling policies of web server against the HTTP request flooding attack which has been the base of this research work. In this paper, the various types of AL-DDoS attacks launched by exploiting the HTTP protocol have been reviewed. The key aim is to compare the requests queue scheduling policies of web server against HTTP request flooding attack using NS2 simulator. Various simulation scenarios have been presented for comparison, and it has been established that queue scheduling policy can be a significant role player in tolerating the AL-DDoS attacks.

Suggested Citation

  • Manish Kumar & Abhinav Bhandari, 2017. "Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 11(4), pages 29-46, October.
  • Handle: RePEc:igg:jisp00:v:11:y:2017:i:4:p:29-46
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.2017100103
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jisp00:v:11:y:2017:i:4:p:29-46. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.