Back to Search
Start Over
Results and Discussions
- Publication Year :
- 2016
- Publisher :
- Elsevier, 2016.
-
Abstract
- In this chapter, we show the results and discussions of the presented theoretical and experimental implementations. We use Mikrotik routers as end clients to generate random user datagram protocol (UDP) and transmission control protocol (TCP) packets to destination B. Mikrotik Linux-based firewall server gave us simulated behavior of attacks in large networks as well. We also focus on obtaining an optimum parameter for router setting and make trade-offs to improve efficiency of mitigating DDoS attacks. To achieve higher detection rate in the lowest time, we also consider and keep the two main factors of false-positive and false-negative errors optimum. In this work, we tried to satisfy these factors as well.
Details
- Database :
- OpenAIRE
- Accession number :
- edsair.doi...........a86687f1e7c975091952c706f51b3c5b
- Full Text :
- https://doi.org/10.1016/b978-0-12-805391-1.00004-3