Publication detail

Testing of DDoS Protection Solutions

MALINA, L. DZURENDA, P. HAJNÝ, J.

Original Title

Testing of DDoS Protection Solutions

Czech Title

Testování řešení ochrany DDoS

English Title

Testing of DDoS Protection Solutions

Type

conference paper

Language

en

Original Abstract

This work deals with DoS and DDoS detection techniques and presents the testing procedures of DDoS protection solutions. Besides these detection techniques, we survey the DDoS protection solutions and special DDoS protection appliances and evaluate them. Further, we introduce two testing procedures for observing the behaviour of network security and DDoS protection appliances during the DDoS attacks.

Czech abstract

Tato práce se zabývá DoS a DDoS detekcí a představuje testovací postupy u řešeních pro ochranu proti DDoS. Kromě těchto detekčních technik, zkoumáme a zhodnocujeme i řešení na ochranu proti DDoS a zařízení proti DDoS. Dále jsme představili dvě testovací procedury pro pozorování chování zabezpečení sítě a DDoS ochran během DDoS útoků.

English abstract

This work deals with DoS and DDoS detection techniques and presents the testing procedures of DDoS protection solutions. Besides these detection techniques, we survey the DDoS protection solutions and special DDoS protection appliances and evaluate them. Further, we introduce two testing procedures for observing the behaviour of network security and DDoS protection appliances during the DDoS attacks.

Keywords

DoS Attacks; DDoS Attacks; DDoS protection; DDoS detection; network; security; tests

RIV year

2015

Released

21.05.2015

Location

Brno

ISBN

978-80-7231-997-8

Book

Security and Protection of Information 2015

Pages from

113

Pages to

128

Pages count

15

BibTex


@inproceedings{BUT115352,
  author="Lukáš {Malina} and Petr {Dzurenda} and Jan {Hajný}",
  title="Testing of DDoS Protection Solutions",
  annote="This work deals with DoS and DDoS detection techniques and presents the testing procedures of DDoS protection solutions. Besides these detection techniques, we survey the DDoS protection solutions and special DDoS protection appliances and evaluate them. Further, we introduce two testing procedures for observing the behaviour of network security and DDoS protection appliances during the DDoS attacks.",
  booktitle="Security and Protection of Information 2015",
  chapter="115352",
  howpublished="electronic, physical medium",
  year="2015",
  month="may",
  pages="113--128",
  type="conference paper"
}