CFP last date
22 April 2024
Reseach Article

Attack Prevention and Attack Detection Strategies by Comparing different DDos Models

by Siva Balaji Yadav C., R. Seshadri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 14
Year of Publication: 2015
Authors: Siva Balaji Yadav C., R. Seshadri
10.5120/ijca2015907094

Siva Balaji Yadav C., R. Seshadri . Attack Prevention and Attack Detection Strategies by Comparing different DDos Models. International Journal of Computer Applications. 129, 14 ( November 2015), 24-27. DOI=10.5120/ijca2015907094

@article{ 10.5120/ijca2015907094,
author = { Siva Balaji Yadav C., R. Seshadri },
title = { Attack Prevention and Attack Detection Strategies by Comparing different DDos Models },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 14 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 24-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number14/23142-2015907094/ },
doi = { 10.5120/ijca2015907094 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:48.421526+05:30
%A Siva Balaji Yadav C.
%A R. Seshadri
%T Attack Prevention and Attack Detection Strategies by Comparing different DDos Models
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 14
%P 24-27
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

DDoS attacks are launched with the intention of depleting the network and server resources. The proposed work identifies that the malice behavior of the nodes requesting service and the malice nature of the traffic are the two major issues to be addressed. Accordingly, the defense framework employs attack avoidance methods, attack prevention model and attack detection strategies to be deployed in each autonomous system (AS). A way of avoiding attacks is to ensure that attacks may not exploit the vulnerabilities. This is achieved in this work through enhanced anti-spoofing techniques that resolve insider attacks, and a differentiated routing based on traffic classification.

References
  1. Gil, T. M., and Poletter, M. (2001). Multops : a data-structure for bandwidth attack detection. Proceedings of US ENIX Security Symposium . USENIX Press, Berkeley, CA.
  2. Mahajan, R., Bellovin, S. M., Floyd, S., Ioannidi s, J., Paxson, V., and Shenker, S. (2002). Controlling high bandwidth aggregates in the network. ACM SIGCOMM Computer Communications Review , 32(3), 62-73.
  3. Li, J., Mirkovic, J., Wang, M., Reiher, P ., and Zhang, L. (2002). Save: source address validity enforcement protocol. Proceedings of IEEE Infocom , 3, 1557-1566. IEEE Press, New York.
  4. Gu, Q., Liu, P., and Chu, C. (2004). Tactical bandwidth exhaustion in ad hoc networks. Proceedings of the 5th Annual I EEE Information Assurance Workshop , 257-264. IEEE Press, New York.
  5. Zhang, R., and Chen, K. (2005). Improvements on the WTLS protocol to avoid denial of service attacks. Computers & Security , Vol. 24(1), pp. 76-82.
  6. Gu, Q., Liu, P., Zhu, S., and Chu, C. H. (2005) . Defending against packet injection attacks in unreliable ad hoc networks. Proceedings of IEEE Globecom . IEEE Press, New York.
  7. Aljifri, H., Smets, M., and Pons A. (2003). IP Traceback using header compression. Computers & Security , Vol. 22(2), pp. 136-151.
  8. V. Yegneswaran, P. Barford, and J. Ullrich. (2003) Internet intrusions: Global characteristics and prevalence. In In Proceedings of the 2003 ACM SIGMETRICS International conference on Measurement and Modeling of Computer Systems, pages 138-147.
  9. Y. L. Zheng and J. Leiwo. (1997)A Method to Implement a Denial of Service Protection Base. In Information Security and Privacy , volume 1270 of LNCS, pages 90-101.
  10. F. Lau, S. H. Rubin, M. H. Smith, and L. Trajkovic. (2000.) Distributed Denial of Service Attacks. InIEEE International Conference on Systems, Man, and Cybernetics , pages 2275-2280, Nashville, TN, USA.
  11. S. Savage, D. Wetherall, A. Karlin, and T. Anderson. (2000) Practical Network Support for IP Traceback. In Proceedings of ACM SIGCOMM.
Index Terms

Computer Science
Information Sciences

Keywords

DDoS Attack detection Autonomous system anti-spoofing.