Abstract
The subject of this article is the issue of security of network resources in computer networks. One of the main problems of computer networks are Distributed Denial of Service attacks, which can take all server resources and block them. The FTBint intelligent method can manage the amount of network traffic passed to a server and help the server to work during the attack. After the attack is recognized the number of connections provided to the server can be changed in time in an intelligent way. Such solution gives time to the server to dispose of the resources which were allocated incorrectly by the attacker. This new concept is different from the one used in the currently existing methods, as it enables the user to finish his work which had been started before the attack occured. Such user does not suffer from DDoS attacks when the FTBint method is used. The proposed method has already been tested.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Angryk, R.A., Czerniak, J.: Heuristic algorithm for interpretation of multi-valued attributes in similarity-based fuzzy relational databases. Int. J. Approximate Reasoning 51(8), 895–911 (2010)
Apiecionek, Ł., Czerniak, J.M., Zarzycki, H.: Protection tool for distributed denial of services attack. In: Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds.) BDAS 2014. CCIS, vol. 424, pp. 405–414. Springer, Heidelberg (2014)
CA-1996-01, C.A.: UDP port denial-of-service attack. http://www.cert.org/advisories/CA-1996-01.html
CA-1996-21, C.A.: TCP syn flooding and ip spoofing attacks. http://www.cert.org/advisories/CA-1996-21.html
Chang, R.K.: Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun. Mag. 40(10), 42–51 (2002)
Czerniak, J.: Evolutionary approach to data discretization for rough sets theory. Fund. Inform. 92(1–2), 43–61 (2009)
Czerniak, J.M., Apiecionek, Ł., Zarzycki, H.: Application of ordered fuzzy numbers in a new OFNAnt algorithm based on ant colony optimization. In: Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds.) BDAS 2014. CCIS, vol. 424, pp. 259–270. Springer, Heidelberg (2014)
Dobrosielski, W.T., Szczepański, J., Zarzycki, H.: A proposal for a method of defuzzification based on the golden ratio-GR. In: Atanassov, K.T., et al. (eds.) Novel Developments in Uncertainty Representation and Processing. AISC, vol. 401, pp. 75–84. Springer, Switzerland (2016). http://dx.doi.org/10.1007/978-3-319-26211-6_7
Ewald, D., Czerniak, J.M., Zarzycki, H.: Approach to solve a criteria problem of the ABC algorithm used to the WBDP multicriteria optimization. In: Angelov, P., et al. (eds.) IS 2014. AISC, vol. 322, pp. 129–137. Springer, Heidelberg (2015)
Kosiński, W., Prokopowicz, P., Ślęzak, D.: On algebraic operations on fuzzy reals. In: Rutkowski, L., Kacprzyk, J. (eds.) Neural Networks and Soft Computing. ASC, vol. 19, pp. 54–61. Springer, Heidelberg (2003)
Moore, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. (TOCS) 24(2), 115–139 (2006)
Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spafford, E.H., Sundaram, A., Zamboni, D.: Analysis of a denial of service attack on TCP. In: 1997 IEEE Symposium on Security and Privacy, pp. 208–223. IEEE (1997)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Apiecionek, Ł., Makowski, W. (2016). Intelligent FTBint Method for Server Resources Protection. In: Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds) Beyond Databases, Architectures and Structures. Advanced Technologies for Data Mining and Knowledge Discovery. BDAS BDAS 2015 2016. Communications in Computer and Information Science, vol 613. Springer, Cham. https://doi.org/10.1007/978-3-319-34099-9_53
Download citation
DOI: https://doi.org/10.1007/978-3-319-34099-9_53
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-34098-2
Online ISBN: 978-3-319-34099-9
eBook Packages: Computer ScienceComputer Science (R0)