Back to Search Start Over

Results and Discussions

Authors :
Iraj Sadegh Amiri
M. R. K. Soltanian
Publication Year :
2016
Publisher :
Elsevier, 2016.

Abstract

In this chapter, we show the results and discussions of the presented theoretical and experimental implementations. We use Mikrotik routers as end clients to generate random user datagram protocol (UDP) and transmission control protocol (TCP) packets to destination B. Mikrotik Linux-based firewall server gave us simulated behavior of attacks in large networks as well. We also focus on obtaining an optimum parameter for router setting and make trade-offs to improve efficiency of mitigating DDoS attacks. To achieve higher detection rate in the lowest time, we also consider and keep the two main factors of false-positive and false-negative errors optimum. In this work, we tried to satisfy these factors as well.

Details

Database :
OpenAIRE
Accession number :
edsair.doi...........a86687f1e7c975091952c706f51b3c5b
Full Text :
https://doi.org/10.1016/b978-0-12-805391-1.00004-3