Skip to main content

Development of DDoS Attack Defense System Based on IKEv2 Protocol

  • Conference paper
  • First Online:
Proceedings of International Conference on Soft Computing Techniques and Engineering Application

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 250))

  • 1613 Accesses

Abstract

IKE version second (IKEv2) simplifies the redundant function of IKEv1 and enhances the security of internet. This paper uses a DDoS attack detection technology, if the detection detected the DDoS attacks, with the establishment of good faith database TD filtering the network data flow, defense DDoS attack. The paper presents development of DDoS attack defense system based on IKEv2 protocol. This paper designs a secure and practical IKEv2 system implementation scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Soussi, H., Hussain, M., Afifi, H., Seret, D.: IKEv1 and IKEv2: A quantitative analyses. The 4th World Enformatika Conference (2005)

    Google Scholar 

  2. Zhao, L., Li, X., Dong, Q., Shi, L.: An IKEv2 based security authentication scheme for mobile network. AISS 3(9), 191–198 (2011)

    Article  Google Scholar 

  3. Kwok, Y.K., Tripathi, R., Chen, Y., Hwang, K.: HAWK: Halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks. ICCNMC, pp. 423–432 (2005)

    Google Scholar 

  4. Yan, H., Wang, F., Cao, Z., Lin, F., Chen, C.: A novel method to defense against web DDoS. JDCTA 6(19), 162–170 (2012)

    Article  Google Scholar 

  5. Fan, L., Zeng, W., Jiang, Y., Li, J., Liang, Q.: A group tracing and filtering tree for REST DDos in cloud. JDCTA 4(9), 212–224 (2010)

    Article  Google Scholar 

  6. Perlman, R., Kaufman, C.: Key exchange in IPsec: Analysis of IKE. IEEE Internet Comput. 4(6), 50–56 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qing Tan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Tan, Q., Yue, X. (2014). Development of DDoS Attack Defense System Based on IKEv2 Protocol. In: Patnaik, S., Li, X. (eds) Proceedings of International Conference on Soft Computing Techniques and Engineering Application. Advances in Intelligent Systems and Computing, vol 250. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1695-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1695-7_4

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1694-0

  • Online ISBN: 978-81-322-1695-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics