Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/4290
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSrileka, S-
dc.contributor.authorSophia Reena, G-
dc.date.accessioned2023-11-20T03:47:26Z-
dc.date.available2023-11-20T03:47:26Z-
dc.date.issued2017-10-
dc.identifier.urihttps://ieeexplore.ieee.org/document/8321129-
dc.description.abstractA Distributed Denial of Service flooding attack in the network performed implicitly and as well as explicitly by the attacker or victim. This attempt is performed to overload the server, generate malicious traffic or interrupting the service. This issue crashes the host and the host's service will be unavailable to the legitimate users. The flexible nature of the network always suffers from DDoS flooding, spoofed source address, and packet or content forgery. Although several defense systems have been proposed by researchers, the problem remains largely unresolved and unreliable for many attacks. Very few researches are interests in using path identifiers (PID) to mitigate the DDoS flooding attacks in the network. But, the existing PIDs are static. The static PIDs are also insecure. To address the above issue, in this paper, we developed the design, implementation, and evaluation of DSPID, a framework that uses dynamic secure PIDs (DSPID) verified with every packet to avoid the DDoS flooding, forgery and spoofing attacks. The proposed system also avoids the selective flooding attack by providing anonymous node id for every node in the network. The proposed system comprises three aspects such as Detect the attack, mitigates the effects of attack and resolves the attack by tracing the source of attack. The proposed mechanism successfully identifies and authenticates the node by the DSPID and anonymous node id. And the system responds to the threat by applying a discriminative rate limit on the malicious traffic flow towards the victim, based on the severity of the attack traffic from each machine and the duration of attack persistence. The proposed system is simple but highly effective in detecting and mitigating distributed denial of service flooding, forgery and spoofing attacks. The experiments and results shows the proposed system achieved better result in terms of several QOS parameters.en_US
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.titleMITIGATING AND RESOLVING DISTRIBUTED DENIAL-OF-SERVICE ATTACKS WITH ENHANCED RANDOM ANONYMOUS PATH IDENTIFIERSen_US
dc.typeOtheren_US
Appears in Collections:3.Conference Paper (10)



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.