Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/8555
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Johny, J. | |
dc.contributor.author | Singh, M.P. | |
dc.date.accessioned | 2020-03-30T10:22:25Z | - |
dc.date.available | 2020-03-30T10:22:25Z | - |
dc.date.issued | 2018 | |
dc.identifier.citation | 2018 Conference on Information and Communication Technology, CICT 2018, 2018, Vol., , pp.- | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/8555 | - |
dc.description.abstract | In this paper, we address the issue of network dominating attack through which a malicious user tries to grab an unfair share of bandwidth. In this attack, malicious senders on receiving the congestion indication, increase their congestion window instead of decreasing. Random Early Detection (RED), which is one of the current Active Queue Management (AQM) schemes, fails to identify such flow that leads to unfair sharing of bandwidth. Therefore, we present a unique solution which works on top of RED to detect and mitigate the anomalous flows by monitoring the packets present in the gateway buffer. � 2018 IEEE. | en_US |
dc.title | Network Dominating Attack Detection and Mitigation | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.