Mobility

Comparison of Queuing Algorithms Against DDoS Attack

Free registration required

Executive Summary

In this paper, the authors are going to present the simulation results of comparison of five queuing algorithms (Drop Tail, Fair Queuing, Stochastic Fair Queuing, Deficit Round Robin and Random Early Detection) using ns-2 as simulation environment. Comparison of the queuing algorithms is based on attack-intensity. They are checking the performance of each queuing algorithm on a particular queue limit against different attack intensities. Here an attempt has been made to cover an overview of Denial of Service (DoS) attack, Distributed Denial of Service (DDoS) attack, methods of attack, DDoS attack tool kits and queuing algorithms.

  • Format: PDF
  • Size: 459.94 KB