CFP last date
20 May 2024
Reseach Article

Defense of DDoS Attacks using Traffic Analysis at Router Level

by Sirisala Sreenivasulu, S. S. Raja Kumari, V. Chandra Sekhar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 51 - Number 10
Year of Publication: 2012
Authors: Sirisala Sreenivasulu, S. S. Raja Kumari, V. Chandra Sekhar
10.5120/8079-1479

Sirisala Sreenivasulu, S. S. Raja Kumari, V. Chandra Sekhar . Defense of DDoS Attacks using Traffic Analysis at Router Level. International Journal of Computer Applications. 51, 10 ( August 2012), 33-36. DOI=10.5120/8079-1479

@article{ 10.5120/8079-1479,
author = { Sirisala Sreenivasulu, S. S. Raja Kumari, V. Chandra Sekhar },
title = { Defense of DDoS Attacks using Traffic Analysis at Router Level },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 51 },
number = { 10 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 33-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume51/number10/8079-1479/ },
doi = { 10.5120/8079-1479 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:50:03.558244+05:30
%A Sirisala Sreenivasulu
%A S. S. Raja Kumari
%A V. Chandra Sekhar
%T Defense of DDoS Attacks using Traffic Analysis at Router Level
%J International Journal of Computer Applications
%@ 0975-8887
%V 51
%N 10
%P 33-36
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Efficient Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem and the current solution space. The attack classification criteria were selected to highlight commonalities and important features of attack strategies, that defines challenges and dictate the design of countermeasures. We propose a novel trace back method for DDoS attacks that is based on entropy variations between normal and DDoS attack traffic, which is fundamentally different from commonly used packet marking techniques, results are graphically represented, the proposed model out performs the existing models in a significant way.

References
  1. T. Baba and S. Matsuda, "Tracing Network Attacks to TheirSources," IEEE Internet Computing, vol. 6, no. 2, pp. 20-26, Mar. 2002.
  2. Belenky and N. Ansari, "On IP Traceback," IEEE Comm. Magazine, pp. 142-153, July 2003.
  3. M. T. Goodrich, "Probabilistic Packet Marking for Large-Scale IP Traceback," IEEE/ACM Trans. Networking, vol. 16, no. 1, pp. 15-24, Feb. 2008.
  4. G. Jin and J. Yang, "Deterministic Packet Marking Based on Redundant Decomposition for IP Traceback," IEEE Comm. Letters, vol. 10, no. 3, pp. 204-206, Mar. 2006.
  5. K. Park and H. Lee, "On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack," Proc. IEEE INFOCOM, 2001.
  6. T. Peng, C. Leckie, and K. Ramamohana rao, "Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems," ACM Computing Surveys, vol. 39, no. 1, p. 3, 2007.
  7. H. Aljifri, "IP Traceback: A New Denial-of-Service Deterrent?" IEEE Security & Privacy, vol. 1, no. 3, pp. 24-31, May/June 2003.
  8. Z. Gao and N. Ansari, "Tracing Cyber Attacks from the Practical Perspective," IEEE Comm. Letters, vol. 43, no. 5, pp. 123-131, May 2005.
  9. B. Al-Duwairi and M. Govindarasu, "Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback,"
  10. . Saurabh, S. ; Sairam, A. S "Linear and Remainder Packet Marking for fast IP traceback", Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference
  11. M. ; Mercy Shalinie, S. ; Arun Pragash, A. "IP traceback system for network and application layer attacks," Recent Trends In Information Technology (ICRTIT), 2012 International Conference
  12. Wen-Chung Kuo; Yi-Lin Chen; Shuen-Chih Tsai;,Single-Packet IP Traceback with Less Logging Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference
Index Terms

Computer Science
Information Sciences

Keywords

DDoS attacks IP trace back Entropy variation