Please use this identifier to cite or link to this item:
Title: Performance analysis of TCP/AQM under denial-of-service attacks
Authors: Luo, X
Chang, R 
Chan, E
Keywords: Internet
Queueing theory
Telecommunication congestion control
Telecommunication network management
Telecommunication security
Telecommunication traffic
Transport protocols
Issue Date: 2005
Publisher: IEEE
Source: 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems :2005, 27-29 September 2005, p. 97-104 How to cite?
Abstract: The interaction between TCP and various active queue management (AQM) algorithms has been extensively analyzed for the last few years. However, the analysis usually assumed that routers and TCP flows are not under any network attacks. In this paper, we investigate how the performance of TCP flows is affected by denial-of-service (DoS) attacks under the drop tail and various AQM schemes. In particular, we consider two types of DoS attacks-the traditional flooding-based DoS (FDDoS) attacks and the recently proposed pulsing DoS (PDoS) attacks. Both analytical and simulation results support that the PDoS attacks are more effective than the FDDoS attacks under the same average attack rate. Moreover, the drop tail surprisingly outperforms the RED-like AQMs when the router is under a PDoS attack, whereas the RED-like AQMs perform better under a severe FDDoS attack. On the other hand, the Adaptive Virtual Queue algorithm can retain a higher TCP throughput during PDoS attacks as compared with the RED-like AQMs.
ISBN: 0-7695-2458-3
ISSN: 1526-7539
DOI: 10.1109/MASCOTS.2005.50
Appears in Collections:Conference Paper

View full-text via PolyU eLinks SFX Query
Show full item record


Last Week
Last month
Citations as of Jul 12, 2018

Page view(s)

Last Week
Last month
Citations as of Jul 9, 2018

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.