A hybrid defense technique for ISP against the distributed denial of service attacks

Young Hoon Moon, Suk Bong Choi, Huy Kang Kim, Changsok Yoo

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)


As malicious traffic from botnets now threatens the network infrastructure of Internet Service Providers (ISPs), the importance of controlling botnets is greater than ever before. However, it is not easy to handle rapidly evolving botnets efficiently because of the highly evolved detection avoidance techniques used by botnet makers. Further, nowadays, Distributed Denial of Service (DDoS) attacks can compromise not only specific target sites but also the entire network infrastructure, as high-bandwidth Internet services are now being provided. Thus, ISPs are deploying their own defense systems to prevent DDoS attacks and protect their network infrastructure. However, the new problem ISPs confront is that botnet masters also try to destroy their defense systems to make their attack successful. ISPs can mitigate DDoS through botnet-specific management by taking preemptive measures, such as the proactive reverse engineering of suspicious code and the use of honeypots. This paper illustrates an advanced DDoS defense technique for the use of ISPs with a real case study of the technique's implementation. This technique was proven very effective method for controlling botnets, and we could confirm this effectiveness in a real ISP environment.

Original languageEnglish
Pages (from-to)2347-2359
Number of pages13
JournalApplied Mathematics and Information Sciences
Issue number5
Publication statusPublished - 2014 Sept


  • Botnet
  • Distributed denial of service attack
  • Internet service provider
  • Security

ASJC Scopus subject areas

  • Analysis
  • Numerical Analysis
  • Computer Science Applications
  • Computational Theory and Mathematics
  • Applied Mathematics


Dive into the research topics of 'A hybrid defense technique for ISP against the distributed denial of service attacks'. Together they form a unique fingerprint.

Cite this