top of page

Team 4

Title: Evaluating Power and Performance Consumption in a P2P Network While Mitigating a DDOS Attack Within ns-3.

 

Abstract:

The project examines how peer-to-peer networks operate when compromised with simulated DDOS attacks and how the network can combat excessive power consumption and performance loss through prevention techniques. Through ns-3 we can apply attack mitigation systems to boost the performance metrics and mitigate the effect of a simulated DDOS attack on the peer-to-peer system. Key components such as network congestion, node processing load, and power efficiency can be modelled and analyzed upon applying the simulation. From these sets of data, we can gain insights into how a balance of both security and effective energy usage can be derived from a peer-to-peer network while undergoing a simulated DDOS attack. 

References:

  • IEEE Conference Papers & Articles:

    • [1] N. Singh and S. De, “Survey on recent DDoS mitigation techniques and comparative analysis,” Proc. Int. Conf. Adv. Comput. Commun. Autom. (ICACCA), 2016, pp. 1–5. doi: 10.1109/ICACCA.2016.7546581.

    • [2] A. K. Verma and D. Mukhopadhyay, “DDoS testbed based on peer-to-peer grid,” Proc. Int. Conf. Inf. Process. (ICIP), 2017, pp. 1–6. doi: 10.1109/INFOP.2017.7955627.

    • [3] N. Fan, D. L. Goeckel, D. Towsley, and P. Basu, “Simulation of DDoS attacks on P2P networks,” Proc. IEEE Mil. Commun. Conf. (MILCOM), 2011, pp. 1883–1888. doi: 10.1109/MILCOM.2011.6063048.

    • [4] S. T. Vuong and Y. H. Wang, “Distinguishing the master to defend DDoS attack in peer-to-peer networks,” Proc. IEEE Int. Conf. Comput. Intell. Security (CIS), 2010, pp. 212–217. doi: 10.1109/CIS.2010.5578493.

    • [5] R. Al-Sayyed and A. Ouda, “A survey of P2P overlays in various networks,” Proc. Int. Conf. Inf. Sci. Appl. (ICISA), 2011, pp. 1–7. doi: 10.1109/ICISA.2011.6024559.

bottom of page