Openly accessible

Protecting information systems from DDoS attack using multicore methodology

Chonka, Ashley, Zhou, Wanlei, Knapp, Keith and Xiang, Yang 2008, Protecting information systems from DDoS attack using multicore methodology, in CIT 2008 : Proceedings of IEEE 8th International Conference on Computer and Information Technology, IEEE, Piscataway, N.J., pp. 270-275.

Attached Files
Name Description MIMEType Size Downloads
zhou-protectinginformationsystems-2008.pdf Published version application/pdf 352.06KB 680

Title Protecting information systems from DDoS attack using multicore methodology
Author(s) Chonka, Ashley
Zhou, Wanlei
Knapp, Keith
Xiang, Yang
Conference name IEEE International Conference on Computer and Information Technology (8th : 2008 : Sydney, N.S.W.)
Conference location Sydney, N.S.W.
Conference dates 8-11 July 2008
Title of proceedings CIT 2008 : Proceedings of IEEE 8th International Conference on Computer and Information Technology
Editor(s) He, Xiangjian
Wu, Qiang
Nguyen, Quang Vinh
Jia, Wenjing
Publication date 2008
Conference series International Conference on Computer and Information Technology
Start page 270
End page 275
Total pages 6
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) bodyguard
multicore
neural network
non-linear dynamic system and DDoS
Summary Previous work, in the area of defense systems has focused on developing a firewall like structure, in order to protect applications from attacks. The major drawback for implementing security in general, is that it affects the performance of the application they are trying to protect. In fact, most developers avoid implementing security at all. With the coming of new multicore systems, we might at last be able to minimize the performance issues that security places on applications. In our bodyguard framework we propose a new kind of defense that acts alongside, not in front, of applications. This means that performance issues that effect system applications are kept to a minimum, but at the same time still provide high grade security. Our experimental results demonstrate that a ten to fifteen percent speedup in performance is possible, with the potential of greater speedup.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
ISBN 9780769532424
Language eng
Field of Research 089999 Information and Computing Sciences not elsewhere classified
HERDC Research category E1 Full written paper - refereed
Persistent URL http://hdl.handle.net/10536/DRO/DU:30018211

Document type: Conference Paper
Collections: School of Engineering and Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: Scopus Citation Count Cited 7 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 371 Abstract Views, 680 File Downloads  -  Detailed Statistics
Created: Fri, 14 Aug 2009, 14:06:03 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.