Performance of Ad-Hoc Networks Using Smart Technology Under DDoS Attacks

  • Conference paper
  • First Online:
Innovations in Smart Cities Applications Volume 5 (SCA 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 393))

  • 1295 Accesses

Abstract

The networks used in many areas such as location-based services, robotics, smart building assessment, smart water management, smart mobile learning, medical image analysis and processing, wearable technologies have to deal with various security problems. Active queue management algorithms are used to manage network resources and solve problems in the network. DDoS attacks prevent the effective use of network resources and cause network services to be disrupted or dropout. In this study, we classify the performance of queue management algorithms such as RED, SRED, BLUE, SFB, REM and CoDel under DDoS attacks according to delay, throughput, jitter, fairness index values. As a result of the comparison, thanks to the flexible structure of the CoDel algorithm, it gives better results in terms of packet loss and fairness index value under DDoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 277.13
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 353.09
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 353.09
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. S. Floyd, TCP and explicit congestion notification. ACM SIGCOMM Comput. Commun. Rev. 24(5), 8–23 (1994). https://doi.org/10.1145/205511.205512

    Article  MathSciNet  Google Scholar 

  2. N. Iya, N. Kuhn, F. Verdicchio, G. Fairhurst, Analyzing the impact of bufferbloat on latency-sensitive applications, in 2015 IEEE International Conference on Communications (ICC) (2015), pp. 6098–6103. https://doi.org/10.1109/ICC.2015.7249294

  3. M. Çakmak, Z. Albayrak, Performance analysis of queue management algorithms between remote-host and PG-W in LTE networks. Acad. Platform J. Eng. Sci. 456–463 (2020). https://doi.org/10.21541/apjes.662677

  4. Z. Albayrak, M. Çakmak, A review: mobile communication past, present and future, in International Conference on Advanced Technologies, Computer Engineering and Science (2018), pp. 141–145

    Google Scholar 

  5. M. Casoni, C.A. Grazia, M. Klapez, N. Patriciello, How to avoid TCP congestion without drop** packets: an effective AQM called PINK. Comput. Commun. 103, 49–60 (2017). https://doi.org/10.1016/j.comcom.2017.02.010

    Article  Google Scholar 

  6. H.C. Altunay, Z. Albayrak, A.N. Özalp, M. Çakmak, Analysis of anomaly detection approaches performed through deep learning methods in SCADA systems, in 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (2021), pp. 1–6

    Google Scholar 

  7. M. Çakmak, Z. Albayrak, C. Torun, Performance comparison of queue management algorithms in LTE networks using NS-3 simulator. Tehn. Vjesnik 28, 135–142 (2021). https://doi.org/10.17559/TV-20200411071703

    Article  Google Scholar 

  8. Arora, L. Bhambhu, Evaluation of active queue management algorithms. Int. J. Comput. Sci. Trends Technol. (IJCST) 2(4), 197–203 (2014)

    Google Scholar 

  9. V. Jacobson, K. Nichols, K. Poduri, Cisco Systems, RED in a Different Light (1999)

    Google Scholar 

  10. T.J. Ott, T.V. Lakshman, L.H. Wong, SRED: stabilized RED, in IEEE INFOCOM 1999. Conference on Computer Communications. Proceedings of Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, vol.3. The Future is Now (Cat. No.99CH36320) (1999), pp. 1346–1355. https://doi.org/10.1109/INFCOM.1999.752153

  11. S. Pourmohammad, A. Fekih, D. Perkins, Stable queue management in communication networks. Control. Eng. Pract. 37, 67–79 (2015). https://doi.org/10.1016/j.conengprac.2015.01.001

    Article  Google Scholar 

  12. W.C. Feng, K.G. Shin, D.D. Kandlur, D. Saha, The Blue active queue management algorithms. IEEE/ACM Trans. Netw. 10, 513–528 (2002). https://doi.org/10.1109/TNET.2002.801399

    Article  Google Scholar 

  13. W. Feng, D. Kandlur, D. Saha, K. Shin, BLUE: a new class of active queue management algorithms, Ann Arbor, pp. 1–27 (1999)

    Google Scholar 

  14. S. Athuraliya, S.H. Low, V.H. Li, Q.Y.Q. Yin, REM: active queue management. IEEE Netw. 15(June), 48–53 (2001). https://doi.org/10.1109/65.923940

    Article  Google Scholar 

  15. Queue Management Performance Evaluation of REM, GRED, AND DropTail Algorithms, Master of Science of Information and Communication Tech (2012)

    Google Scholar 

  16. W. Feng, D.D. Kandlur, D. Saha, K.G. Shin, Stochastic fair blue: a queue management algorithm for enforcing fairness (2001). https://doi.org/10.1109/infcom.2001.916648

  17. W.-C. Feng, D.D. Kandlur, D. Saha, K.G. Shin, Stochastic fair blue: a queue management algorithm for enforcing fairness, in INFOCOM 2001. Proceedings of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3 (IEEE, 2001), pp. 1520–1529. https://doi.org/10.1109/INFCOM.2001.916648

  18. D.M. Raghuvanshi, B. Annappa, M.P. Tahiliani, On the effectiveness of CoDel for active queue management, in International Conference on Advanced Computing and Communication Technologies, ACCT (2013), pp. 107–114. https://doi.org/10.1109/ACCT.2013.27

  19. H. Ali, S. Khan, M. Quaid, Comparative analysis of controlled delay (CoDel) with deficit round robin (DRR) to overcome bufferbloat problem in wired network. Int. J. Curr. Eng. Technol. 5(5), 3378–3386 (2015)

    Google Scholar 

  20. Z. Albayrak, M. Çakmak, A review: active queue management algorithms in mobile communication, in International Conference on Cyber Security and Computer Science (2018), pp. 180–184

    Google Scholar 

  21. R. Kaur, A.L. Sangal, K. Kumar, Modeling and simulation of DDoS attack using omnet++ (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammet Çakmak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Said, A.A., Çakmak, M., Albayrak, Z. (2022). Performance of Ad-Hoc Networks Using Smart Technology Under DDoS Attacks. In: Ben Ahmed, M., Boudhir, A.A., Karaș, İ.R., Jain, V., Mellouli, S. (eds) Innovations in Smart Cities Applications Volume 5. SCA 2021. Lecture Notes in Networks and Systems, vol 393. Springer, Cham. https://doi.org/10.1007/978-3-030-94191-8_92

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-94191-8_92

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-94190-1

  • Online ISBN: 978-3-030-94191-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation