TELKOM
NIKA
, Vol.14, No
.4, Dece
mbe
r
2016, pp. 15
59~156
4
ISSN: 1693-6
930,
accredited
A
by DIKTI, De
cree No: 58/DIK
T
I/Kep/2013
DOI
:
10.12928/TELKOMNIKA.v14i4.3880
1559
Re
cei
v
ed Ap
ril 25, 2016; Revi
sed
No
ve
m
ber
24, 201
6; Acce
pted
No
vem
ber 3
0
,
2016
Mitigating Broadcast S
t
orm on Metro Ethernet Network
Using PVST+
Ben
y
Nugra
h
a*, Ba
y
u
Fitrianto, Fahr
a
i
ni Bacharu
d
d
in
Mercu Bua
na
Univers
i
t
y
, Ja
la
n Meru
ya Se
lat
an No. 1, +
62 21 58
40
816
*Corres
p
o
ndi
n
g
author, e-ma
i
l
: ben
yn
ugr
aha
@mercub
u
a
n
a
.
ac.id
A
b
st
r
a
ct
Broadc
ast stor
m
attack co
ntin
uous
ly trans
mits du
plic
at
e p
a
c
k
ets in
ord
e
r to
disru
p
t the
ser
v
ice of
the netw
o
rk. In
this rese
arch,
a Spa
n
n
i
ng T
r
ee Protoc
ol
me
thod, n
a
mely P
VST
+
(Per VLAN Spa
n
n
i
ng T
r
ee
Plus), is used t
o
overco
me th
e prob
le
m that
is cause
d
by th
e broa
dcas
t storm attack o
n
the Metro Ether
net
Netw
ork. The PVST+ serves as a red
u
n
dant
netw
o
rk
ma
na
ge
me
nt and
it preve
n
ts
loo
p
in
g on the
netw
o
rk.
The results obt
ained from
this
researc
h
are the following, PVST+ is abl
e t
o
mitigate broadcast stor
m
that is
show
n by
the
decre
ase
of
n
u
mber
of
pack
e
ts an
d
th
e
de
crease
of th
e
avera
g
e
pack
e
t per-sec
on
d.
T
he
avera
ge p
a
cke
ts per-seco
nd
on VLA
N
1 d
e
creas
e to
2
7
4
,041
an
d the
avera
ge p
a
ck
ets on VLA
N
10
decre
ase to 26
7,794 p
a
ckets
per-sec
ond.
Ke
y
w
ords
: Broadc
ast Storm,
Metro Etherne
t, PVST+, Sec
u
rity Netw
ork,
Span
nin
g
Tree
Protocol
Copy
right
©
2016 Un
ive
r
sita
s Ah
mad
Dah
l
an
. All rig
h
t
s r
ese
rved
.
1. Introduc
tion
Ethernet can
be seen a
s
standa
rd for LAN (Lo
c
al
Area Net
w
o
r
k)/MA
N
(Met
ro Area
Network)/
W
A
N
(Wi
de Are
a
Network)
conne
ction a
s
98% of data tra
ffic in wo
rld
w
ide net
wo
rk is
based on th
e Ethernet. Metro Ethern
e
t networks ar
e de
sig
ned
to be able to provide up
to
200.00
0 hi
gh
-sp
eed
line
s
to en
d-u
s
e
r
s a
nd
org
ani
zation
s th
at
need
mo
re
capa
city in th
eir
comm
uni
cati
ons, thu
s
, the Metro Ethe
rnet networks
are be
st to be co
nne
cted
with fiber op
tics.
Emamjome
h, et al., [1] has prop
osed a
n
optical
sy
ste
m
for the Met
r
o Ethernet a
nd MPLS (m
ulti
proto
c
ol lab
e
l
switching
)
tech
niqu
e is
use
d
for fast
er commu
nication that meets the u
s
e
r
’
s
need
s; ho
we
ver, there is n
o
se
curity an
alysis o
n
their rese
arch.
STP (Spa
nni
ng T
r
ee
Prot
ocol
) m
ana
g
e
s
and
p
r
ovi
des path
red
unda
ncy
whil
e avoidi
ng
unde
sirable l
oop
s in the Ethernet n
e
two
r
ks, a ne
w STP, namely Load Balan
c
e
d
Spannin
g
T
r
e
e
(LBST) ha
s
been p
r
op
osed to to red
u
ce the
com
putational
co
mplexity of the previo
us
BST
algorith
m
[2]. More
over,
Hu
u-Hung
Phan
et al.
[3] ha
s
prop
osed
a n
e
w m
odel
of
Metro Ethe
rn
et
Network a
s
a
n
undi
re
cted
con
n
e
c
tivity graph
by
u
s
in
g the Brid
ge
Protocol Data
Units (BPDUs)
frame ex
cha
nge to d
e
termine the
sh
o
r
test p
a
ths
b
e
twee
n net
work switche
s
, however, b
o
t
h [2]
and [3] did no
t analyze the
se
curity of their metho
d
.
The
broadcast
storm
is an a
ttack
that utilizes sequence
of
broadcast operati
ons from
one o
r
more
device
s
that
occur
at rapi
d packet
s
pe
r-se
con
d
rate
, its goal is t
o
brin
g do
wn
the
netwo
rk. Th
e
numbe
r of packets that i
s
co
ns
i
dered
abnormal is more than 5
00 pa
ckets p
e
r-
se
con
d
[4]. A method to
control the
netwo
rk
st
orm, as well a
s
broad
ca
st
storm, h
a
s b
een
prop
osed i
n
[5], multiple st
atic ag
ents are used to
co
n
t
rol the n
e
two
r
k
sto
r
m in
order to
improv
e
the pe
rform
a
nce
of Ethe
rn
et LAN
netwo
rk,
however, i
t
is n
o
t menti
oned
that thei
r meth
od i
s
a
b
le
to be im
plem
ented
on M
e
tro Ethe
rnet.
Variou
s
soluti
ons to p
r
eve
n
t bro
a
d
c
a
s
t
storm
al
so
h
a
ve
been
pro
p
o
s
e
d
in [6-10], h
o
weve
r, all of
those
metho
d
s a
r
e im
ple
m
ented
on V
A
NETs
(Vehi
cula
r
Ad Hoc
Networks), not on Metro Ethern
e
t network.
Broad
ca
st st
orm i
s
on
e v
a
riant
of DoS
/
DDoS
a
ttack, as me
ntione
d above; its g
oal is to
brea
k d
o
wn
the targ
et sy
stem by floo
ding t
he
net
work
with ju
nk p
a
cket
s. Monitori
ng a
n
d
detectio
n
system can b
e
use
d
to mitigate broa
dcas
t storm as e
a
rly as po
ssi
b
le, Ni et al. [11]
prop
osed
a
monitori
ng d
e
t
ection to
det
ect a
nomaly
pac
ket
s
flo
w
at the
DNS
server, it i
s
sh
own
that their solu
tion can
dete
c
t DDoS atta
ck
accu
ra
tely
. Another sol
u
tion to preve
n
t the broa
dcast
storm
is a
firewall, Alfan
Presekal a
n
d
Ri
ri Fitr
i
Sari [12] p
r
op
osed a
fire
wall
to prevent
DoS
attack that i
s
implem
ented
on
a
Ho
st Id
entity Pr
otocol (HIP), a
n
d
its
sh
own th
at HIP
with t
hei
r
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 16
93-6
930
TELKOM
NIKA
Vol. 14, No. 4, Dece
mb
er 201
6 : 1559 – 156
4
1560
firewall
still manag
e
to work eventh
ough
ther
e
wa
s a
DoS
attack.
De
spi
t
e all of th
e
abov
e
prop
osed
sy
stem
s, their
solutio
n
d
o
e
s
not h
andl
e t
he b
r
oa
dcast
sto
r
m in
pa
rticula
r
, thu
s
,
a
mitigation system for broadcast
storm i
s
still not available.
Based
on th
e
above
previ
ous
re
se
arch
es, it
can
be
con
c
lu
ded th
at there
is
no
solutio
n
to mitigate the bro
a
d
c
a
s
t storm
on a M
e
tro Ether
net
Network, thu
s
, to overco
me the p
r
obl
em,
we propose an SPT method, namely PVST+ (
Per VLAN
Spannin
g
Tree Plus
) to be
impleme
n
ted on
the
Met
r
o Ethernet net
work. The
Graphi
cal
Net
w
ork Simul
a
tor (G
NS
3) is u
s
e
d
for implem
en
tation and
si
mulation p
r
o
c
ess, and t
w
o
VLAN, nam
ely VLAN 1 a
nd VLAN
10
are
use
d
in thi
s
rese
arch. T
he
averag
e p
a
ckets p
e
r-secon
d
on
both VL
AN a
r
e m
e
a
s
ured
befo
r
e
a
nd
after the implementation of
PVST+
to s
how
that the broadc
a
s
t
s
t
orm is
mitigated.
The
re
st of th
e pa
per i
s
o
r
gani
zed
a
s
fo
llows: Se
ction
2 d
e
scribe
s
t
he impl
eme
n
tation of
PVST+ method on the
Metro Ethernet
network, S
e
ct
ion 3 discusse
s the results, and Section 4
con
c
lu
de
s the whol
e re
se
arch.
2. Implementation of PVS
T+ on Me
tro
Ethern
et Netw
o
r
k
This
se
ction
descri
bed t
he pr
ocesse
s of mitigati
ng the
b
r
oa
dca
s
t
sto
r
m attack by
implementing the PVST+.
The fi
rst processes are scanning and
capturing the packet
s
on the
netwo
rk to d
e
tect b
r
oa
dcast
storm
(d
escrib
ed
in
s
u
b-
se
c
t
ion
2
,
1
)
,
th
e
s
e
c
o
nd
pr
oc
ess
is
implementing the PVST+
t
o
mitigate the broadc
as
t
s
t
orm
(present
ed in
s
u
b-s
e
ction 2.2), and
the
last p
r
o
c
e
ss
is optimi
z
in
g
the net
work to prev
e
n
t the future att
a
ck of the
b
r
oad
ca
st
storm
(discu
ssed in
sub
-
sectio
n 2
.
3).
2.1. Scan an
d Cap
t
ure P
acke
ts on th
e Metro Ethe
rnet Net
w
o
r
k
For th
e initial
pro
c
e
ss,
the
GNS
3
simul
a
tor
equip
ped
with
Wi
re
sha
r
k is u
s
ed
to
scan th
e
data p
a
cket
on e
a
ch int
e
rface to
d
e
tect a b
r
oa
dcas
t
sto
r
m,
whi
c
h
is already
se
t to o
c
cur.
T
he
topology that is used for th
e scanni
ng
proce
s
s is sho
w
n in Figu
re
1.
Figure 1. Metro Ethern
e
t Network To
pol
ogy
Figure 1
rep
r
ese
n
ts the
to
pology that i
s
use
d
in thi
s
resea
r
ch; su
ch topolo
g
y is
use
d
to
simulate th
e broa
dcast
storm attack t
hat us
u
a
lly happe
ns
whe
n
there a
r
e a
lot of switch
es.
These switch
es ge
nerate a
lot of duplica
t
e packe
ts
to
c
a
us
e the broadcas
t s
t
orm
attac
k
.
To dete
r
min
e
a net
wo
rk th
at is a
victim
of br
o
a
d
c
a
s
t
storm, th
e dat
a pa
ckets, in
the form
of ping
pa
cke
t
s, are
sent
from the
ho
st t
o
the
gate
w
a
y
with mi
nim
u
m time
limit
of 60
second
s.
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
ISSN:
1693-6
930
Mitigating Broadcas
t Storm on Metro Ether
net Network
Us
ing PVST+
(Beny
Nugraha)
1561
Wires
h
ark
will monitor the traffi
c
th
a
t
oc
cu
rs
du
r
i
ng
th
e
s
i
mu
la
tion time, the
parameters
that
were monito
red are n
u
mb
er of packet
s
and av
era
g
e
packet per-seco
nd du
ring
. Based on [4],
the
bro
a
d
c
a
s
t
storm attack occurs whe
n
the
avera
ge
packet
s
pe
r-seco
nd i
s
abo
ve 500 p
a
cke
t
s-
se
con
d
.
2.2. Implementation of the PVST+
The PVST+ is
implemented in
order to
mitigate the broadc
a
s
t
s
t
orm. The
implementation of PVST+ perform
ed on Core A, Co
re B, and on all four access switches, the
illustratio
n
of the impleme
n
t
ation on the net
wo
rk el
em
ents can be
seen in Figu
re
2.
Figure 2. PVST+
Implementation on Every Network
Element
Figure 2 illustrates the im
plementation of PVS+
on
Core A, Core B, and all switches.
Figure 2 repres
ents
the s
i
mulation of our res
e
arc
h
in GNS 3 s
i
mulator. PVST+
implementation
pro
c
e
ss fo
r e
a
ch
network
element
con
s
ists of tw
o proce
s
se
s, na
mely the co
nfiguratio
n p
r
o
c
ess
and the verification
process. The
com
m
and that i
s
used to
configure the PVST+ on Core
A is
sho
w
n in Fig
u
re 3, whil
e the com
m
an
d that is use
d
to verify the proce
s
s is sho
w
n in Figu
re
4.
Figure 3. Command to Configure PVST
+ on Core A
Figure 4. Command to Verify PVST+ on Core A
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 16
93-6
930
TELKOM
NIKA
Vol. 14, No. 4, Dece
mb
er 201
6 : 1559 – 156
4
1562
It is shown in Figure 3 a
nd Figu
re 4
that
there are two VLANs used for
si
mulation,
namely VLAN 1 and VL
AN 10, these VLANs a
s
well as the
configu
r
atio
n and verification
pro
c
e
ss a
r
e t
he sam
e
for a
ll network ele
m
ents.
2.3. Net
w
o
r
k
Optimizatio
n
Network opti
m
ization i
s
neces
sary if the broad
cast storm st
ill occurs after the
implementation of PVST+
,
s
e
veral options
fo
r network
optimization are the following:
1. Port Fast
Port Fast i
s
a
feature that i
s
provided by
the Cisco
switch
device fo
r faste
r
sp
ann
ing tree
formation. T
h
is featu
r
e i
s
o
n
ly perfo
rme
d
on
por
t
s
th
at are
conne
cted to th
e e
nd u
s
e
r
an
d
i
s
not re
com
m
e
nded fo
r p
o
rt
with “trun
k
in
g”
stat
us
be
cause the d
u
p
licate p
a
cket
s forwa
r
din
g
will still occur.
2.
Uplin
k Fast
This feature h
a
s
simila
r fu
n
c
tion
with P
o
rt Fas
t, it is
to
form
the
span
ning t
r
ee
fast
er, a
n
d
more
over, this feature can
be used
on p
o
rt with “trun
k
ing” statu
s
.
3. Bridge Pro
t
ocol Data Un
it (BPDU) G
u
ard
The fun
c
tion
of the comm
and BPDU
G
uard
is to
m
a
intain the
spanni
ng tree
proto
c
ol
algorith
m
that
has be
en a
d
apted to
an i
n
tegrate
d
n
e
twork. If a p
o
rt that is
con
n
e
cted t
o
the
end user, which
already config
ure
d
wi
th
Port
Fa
st
con
n
e
c
tion, i
s
the
n
repla
c
ed
with
the
swit
ch X, the
n
the
port
wil
l
be
sh
ut do
wn
due
to
switch
X will
send BP
DU m
e
ssag
e to th
e
other switch to reset the algorithm.
4. Backbone
Fast
Backbon
e Fa
st is a feature to accel
e
ra
te t
he delivery of BPDU with the princi
ples of
usin
g the
Ro
ot Link
Que
r
y (RL
Q
), RL
Q ha
s a fun
c
tion to dete
c
t inactive/ind
e
r
ict lin
k. With
Backbon
e Fa
st, the pro
c
e
s
s of determi
ni
ng the root b
r
idge can be a
c
celerated.
3. Results a
nd Analy
s
is
In this
se
ctio
n, the re
sult
and a
nalysi
s
of
the obtai
n
ed data
are
pre
s
ente
d
. Simulation
and evaluation of the implementation of PVST
+ are
consi
s
ts of the following
steps:
1. Traffic mon
i
toring befo
r
e
the impleme
n
t
ation of PVST+
2. Traffic
monitoring after the implementation of PVST
+
3.1. Traffic Monitoring before
the Implementation
of PVST+
Traffic mo
nito
ring i
s
ca
rri
ed
on VLAN 1 a
nd VLAN 1
0
and it is p
e
rf
orme
d at inte
rvals of
90 se
con
d
s, 180 se
co
nd
s,
270
second
s,
360 se
co
nd
s
a
nd 450
se
con
d
s. The o
b
tain
results are
the amo
unts of pa
ckets
and the
average
p
a
cket
s per-second. The
re
sults
of monitori
ng
th
e
traffic before
the impleme
n
t
ation of PVST+ on VLA
N
1 and VLAN
10 ca
n be
se
en in Tabl
e 1
and Tabl
e 2 resp
ectively.
Table 1. Traffic
Monitoring
on VLAN
1 before the implementation of
PVST+
Interval (Second
s)
Amounts of Pa
ckets
Average Packets per Second
90 6357287
69695.631
180 10578588
58271.710
270 14380776
53141.090
360 18029562
50007.938
450 21845159
48145.299
Table 2. Traffic
Monitoring
on VLAN
10
before the implementation of PVST+
Interval (Second
s)
Amounts of Pa
ckets
Average Packets per Second
90 371366
3925.396
180 990780
5461.581
270 1976285
7200.289
360 2896961
8021.201
450 4166094
9058.774
Evaluation Warning : The document was created with Spire.PDF for Python.
TELKOM
NIKA
ISSN:
1693-6
930
Mitigating Broadcas
t Storm on Metro Ether
net Network
Us
ing PVST+
(Beny
Nugraha)
1563
It can
be
see
n
from
Ta
ble
1 an
d T
able
2 that th
e av
erag
e
pa
cket
s
p
e
r-second
on
both
VLAN 1 an
d
VLAN 10 i
s
a
bove 500
pa
ckets p
e
r-se
cond, with the
averag
e nu
mber
of packets
per-second
for VLA
N
1 i
s
558
52.33
4 p
a
ckets pe
r-
se
con
d
a
nd t
h
e
average
nu
mber of
pa
cket
s
per-second f
o
r VLA
N
10
is 67
33.44
8
packet
s
pe
r-se
co
nd. F
r
o
m
these re
sults, it can
be
con
c
lu
ded th
at the broa
dcast sto
r
m occurre
d
on bot
h VLAN 1 an
d VLAN 10. Sub-se
ction
3.2
pre
s
ent
s th
e
result of th
e
averag
e
num
ber of p
a
cket
s p
e
r-second
after th
e im
plementatio
n
of
PVST+
.
3.2. Traffic Monitoring afte
r the Implementation of PVST+
The results
of monitoring the traffic
aft
e
r the implementation of
PVST+
on V
L
AN
1 and
VLAN 10 can
be see
n
in Table 3 an
d Ta
ble 4 re
spe
c
ti
vely.
Table 3. Traffic
Monitoring
on VLAN
1 af
ter the implementation of PVST+
Interval (Second
s)
Amounts of Pa
ckets
Average Packets per Second
90 25033
275.897
180 48912
271.579
270 75226
276.045
360 98633
273.597
450 123351
273.089
Table 4. Traffic
Monitoring
on VLAN
10
after the implementation of
PVST+
Interval (Second
s)
Amounts of Pa
ckets
Average Packets per Second
90 24420
269.948
180 48303
267.512
270 72361
267.481
360 96093
266.858
450 120319
267.175
Table 3
and
Table 4
sh
ow that afte
r the
implem
entation of P
VST+, the n
u
mbe
r
of
packet an
d the averag
e pa
ckes p
e
r-second have de
crea
sed, which the later bei
ng less than
500
packet
s
per-seco
nd. The a
v
erage n
u
mb
er of packet
s
per-se
c
on
d on VLAN 1 h
a
s de
crea
sed
to
274.04
1 p
a
ckets pe
r-se
cond,
while
the ave
r
a
g
e
pa
ckets pe
r-se
con
d
fo
r VLAN 10
has
decrea
s
e
d
to
267.79
4 p
a
ckets p
e
r se
co
n
d
, theref
ore, i
t
can
be
con
c
luded
that PV
ST+ i
s
a
b
le t
o
mitigate the b
r
oad
ca
st sto
r
m. This result resolves
the
missi
ng p
o
int
that occur in
resea
r
ch [5-1
2]
whe
r
e the
r
e i
s
no me
cha
n
i
s
m to co
unter broad
ca
st st
orm on the M
e
tro Ethern
e
t.
4. Conclusio
n
In the initial process of this
research, a
broa
dcast
sto
r
m is si
mulat
ed on Metro Ethernet
Network, it is
sho
w
n
by the
larg
e n
u
mbe
r
of
ave
r
ag
e
packet
s
p
e
r-seco
nd,
which
are
55
852,3
3
4
packet
s
pe
r-se
con
d
on V
L
AN 1 an
d 6
733,44
8 pa
ckets p
e
r-second on VLA
N
10. In ord
e
r to
mitigate the
broadcas
t
s
t
orm, a variat
ion of
s
p
anning tree prot
oc
ol,
namely
the PVST+ is
impleme
n
ted
on both
VL
AN 1 a
nd VL
AN 10. T
he
result
s sho
w
n
that the bro
adcast
storm
on
both VLAN are able to be mitigated by PVST+,
it is shown by the decrease of the average
packet
s
per-se
c
on
d on b
o
th VLAN, which a
r
e 274
,041 packet
s
per-se
c
on
d on VLAN 1 and
267,794 packets per-second on VL
AN 10. PVST+ i
s
able to mitigate
broadcast
stor
m
due to
its
function to
prevent loop
s o
c
curring
on th
e network
an
d it is al
so abl
e to han
dle a
redu
nda
nt pa
th
on the network.
Referen
ces
[1]
Alireza
Emam
j
o
meh,
Hoss
ein
Emami, A
l
i
H
a
shem
i
.
D
e
si
gn
an
d Si
mul
a
tio
n
o
f
Me
tro Eth
e
r
ne
t u
s
i
n
g
Optical Sy
stem.
Majlesi Jo
urn
a
l of Tele
comm
unic
ation Devices
. 201
4; 3(3): 109-1
14.
[2]
Ghasem Mirj
al
il
y
,
Sam
i
ra Sa
madi. Lo
ad B
a
la
nced S
pan
nin
g
T
r
ee in Metro Etherne
t Net
w
orks
.
Journ
a
l of Infor
m
ati
on Syste
m
s and T
e
lec
o
mmu
n
ic
ation
. 2
0
14; 2(2): 11
9-1
26.
[3]
Huu-H
u
n
g
Pha
n
,
T
u
y
e
t-T
h
i Anh Mai, T
ae-W
an Kim, Chu
l
-S
oo Kim. A Loo
p-F
r
ee Metho
d
on Ethernet
Using
Un
dir
e
cted C
o
n
nectivit
y
Gra
ph.
Inter
natio
nal
Jour
n
a
l of E
m
ergi
ng
T
e
chn
o
lo
gy a
nd A
d
vanc
e
d
Engi
neer
in
g
. 2014; 4(2): 7
13-
723.
Evaluation Warning : The document was created with Spire.PDF for Python.
ISSN: 16
93-6
930
TELKOM
NIKA
Vol. 14, No. 4, Dece
mb
er 201
6 : 1559 – 156
4
1564
[4]
Dani
el J. Nass
ar. Net
w
o
r
k Pe
rformance Bas
e
lin
in
g.
1st Edition. India
n
a
pol
is, USA: Sams Publish
i
n
g
.
200
0.
[5]
T
R
Gopalakris
hna
n Nair, B
R
Shub
hama
n
gal
a, Vaide
h
i
M.
A Novel Agent Base
d Appro
a
ch for
Contro
lli
ng Net
w
ork Storms
. IEEE 3
rd
Internation
a
l Co
nfer
ence o
n
Com
m
unic
a
tions a
nd Electro
n
ic
s
(ICCE). Nha T
r
ang, Vietn
a
m. 201
0.
[6]
Xu W
u
, Jun Z
hen
g, Hui T
ong, Nathal
ie Mit
t
on.
DAYcast: A Dyna
mic T
r
ans
missi
on D
e
lay Base
d
Broadc
ast Protocol for
V
ehic
u
lar A
d
Hoc N
e
tw
orks
. IEEE International
Conference
on
Communications (ICC). S
y
dney
, Australia. 2014.
[7]
F
ogué
Cortés
M, Garrido Pic
a
zo MP, Martínez
D
o
míng
ue
z F
J
, Cano Es
cribá J
C
, T
a
vares De Ar
au
jo
,
Cesari
n
y
Cal
a
fate CM, M
anz
oni
P. An
a
d
a
p
tive s
y
stem
base
d
on r
o
a
d
map
profi
l
i
n
g
to e
n
h
anc
e
w
a
rni
n
g
mess
age
diss
emin
a
t
ion i
n
VA
NET
S
. IEEE/ACM Transactions on Networking
. 201
3;
21(
3):
883-
895.
[8]
Anna M
a
ria
Ve
gni, Enr
i
co N
a
t
a
lizi
o
. F
o
r
w
ar
d
e
r Smart Sel
e
c
t
ion Protoc
ol f
o
r Limit
a
tion
of
Broadc
ast
Storm Problem
.
Journal of Net
w
ork and Co
mputer App
lic
ations
. 201
5; 47: 61-7
1
.
[9]
Adil M
udas
ir M
a
lla,
Ravi K
ant
Sahu. S
e
curit
y
Attacks
w
i
t
h
an Effective S
o
luti
on for
DOS Attacks in
VANET
.
Internation
a
l Jo
urna
l of
Computer A
pplic
atio
ns
. 20
13; 66(2
2
): 45-
49.
[10]
Rash
eed
Huss
ain, Ju
ngg
ab S
on, Ha
s
oo Eu
n
,
Sangj
in Kim,
Heek
uck Oh.
Traffic infor
m
ation system
:
A lightw
e
ig
ht geoc
ast-bas
ed
piggy
backi
ng
st
rategy for
coop
erative a
w
areness in
VANET
. IEEE
Internatio
na
l C
onfere
n
ce o
n
Cons
umer Ele
c
tronics (ICCE)
.
Las Vegas, N
V
. 2013.
[11]
T
onggua
ng Ni,
X
i
a
oqi
ng
Gu, Hon
g
y
ua
n
Wa
ng.
D
e
tectin
g
DDoS
Attacks
Agai
nst DNS
S
e
rvers
Usin
g
T
i
me Series A
nal
ysis.
TEL
K
OMNIKA
Indon
esia
n Jour
na
l
of Electrica
l
En
gin
eeri
n
g
. 2
0
1
4
; 12(1): 7
53-
761.
[12]
Alfan Pr
eseka
l
, Riri F
i
tri S
a
ri.
Performa
nce
Comp
ariso
n
of
Host Ide
n
tit
y
Protocol
an
d T
C
P/IP
w
i
t
h
F
i
re
w
a
l
l
ag
ain
s
t Denia
l
of Services.
TEL
K
OMNIKA
Indonesi
an Jo
urna
l
of Electrical
Engi
neer
in
g
.
201
4; 12(1
2
): 8335-
834
3.
Evaluation Warning : The document was created with Spire.PDF for Python.