Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/4290
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Srileka, S | - |
dc.contributor.author | Sophia Reena, G | - |
dc.date.accessioned | 2023-11-20T03:47:26Z | - |
dc.date.available | 2023-11-20T03:47:26Z | - |
dc.date.issued | 2017-10 | - |
dc.identifier.uri | https://ieeexplore.ieee.org/document/8321129 | - |
dc.description.abstract | A Distributed Denial of Service flooding attack in the network performed implicitly and as well as explicitly by the attacker or victim. This attempt is performed to overload the server, generate malicious traffic or interrupting the service. This issue crashes the host and the host's service will be unavailable to the legitimate users. The flexible nature of the network always suffers from DDoS flooding, spoofed source address, and packet or content forgery. Although several defense systems have been proposed by researchers, the problem remains largely unresolved and unreliable for many attacks. Very few researches are interests in using path identifiers (PID) to mitigate the DDoS flooding attacks in the network. But, the existing PIDs are static. The static PIDs are also insecure. To address the above issue, in this paper, we developed the design, implementation, and evaluation of DSPID, a framework that uses dynamic secure PIDs (DSPID) verified with every packet to avoid the DDoS flooding, forgery and spoofing attacks. The proposed system also avoids the selective flooding attack by providing anonymous node id for every node in the network. The proposed system comprises three aspects such as Detect the attack, mitigates the effects of attack and resolves the attack by tracing the source of attack. The proposed mechanism successfully identifies and authenticates the node by the DSPID and anonymous node id. And the system responds to the threat by applying a discriminative rate limit on the malicious traffic flow towards the victim, based on the severity of the attack traffic from each machine and the duration of attack persistence. The proposed system is simple but highly effective in detecting and mitigating distributed denial of service flooding, forgery and spoofing attacks. The experiments and results shows the proposed system achieved better result in terms of several QOS parameters. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.title | MITIGATING AND RESOLVING DISTRIBUTED DENIAL-OF-SERVICE ATTACKS WITH ENHANCED RANDOM ANONYMOUS PATH IDENTIFIERS | en_US |
dc.type | Other | en_US |
Appears in Collections: | 3.Conference Paper (10) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
MITIGATING AND RESOLVING DISTRIBUTED DENIAL-OF-SERVICE ATTACKS WITH ENHANCED RANDOM ANONYMOUS PATH IDENTIFIERS.docx | 262.9 kB | Microsoft Word XML | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.