CFP last date
20 May 2024
Reseach Article

A Proactive Approach towards DDoS Management In Shortest Path Bridging

Published on February 2015 by Mensah Sitti, Gideon Naah, Daniel Owusu-donkor
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 2
February 2015
Authors: Mensah Sitti, Gideon Naah, Daniel Owusu-donkor
396487fd-7d5d-47fa-b888-8a7d12b58f6b

Mensah Sitti, Gideon Naah, Daniel Owusu-donkor . A Proactive Approach towards DDoS Management In Shortest Path Bridging. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 2 (February 2015), 18-22.

@article{
author = { Mensah Sitti, Gideon Naah, Daniel Owusu-donkor },
title = { A Proactive Approach towards DDoS Management In Shortest Path Bridging },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 2 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 18-22 },
numpages = 5,
url = { /proceedings/icaccthpa2014/number2/19440-6021/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A Mensah Sitti
%A Gideon Naah
%A Daniel Owusu-donkor
%T A Proactive Approach towards DDoS Management In Shortest Path Bridging
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 2
%P 18-22
%D 2015
%I International Journal of Computer Applications
Abstract

Changes in technology have affected a large number of sections in the domain of Ethernet. Cloud computing has provided a new dimension for virtual networks (VLAN) as well. These changes have help shaped the paradigm of computer networks on the whole and continues to be the back bone of linking various datacenters. With the introduction of shortest path bridging (approved by IEEE as 802. 1aq) computer networks will experience a more refined way of getting things done in a very excellent way. Distributed Denial of Service (DDoS) on the other hand has affected computer systems and networks to a large degree, although solutions have been provided to contain the situation. Attackers typically exploit well-known vulnerabilities, many of which have readily available fixes. Complicating matters are the intrusion tools that are widely available. Intruders have automated the processes for discovering vulnerable sites, compromising them, installing daemons, and concealing the intrusion. Even security-conscious sites can suffer a denial of service because attackers can control other, more vulnerable computer systems and use them against the more secure site. The use of shortest path bridging to manage DDoS attack is not only to help contain the situation but to also provide a way out and render the attacker helpless. This paper suggests ways that can be used by a victim computer to counter a DDoS attack from a possible attacker or an unintentional attack. It helps to safeguard the user against unwarranted service which might command a computer to do without necessarily being aware. The simulation was conducted on a Linux operating system using ns3 and result obtained gives a promising future to pursue further work on the use of IEEE 802. 1aq Shortest Path Bridging in managing Distributed Denial of service (DDoS).

References
  1. http://en. wikipedia. org/wiki/Ethernet.
  2. Zhen, L. and Changjin, S. , 2011"An improved shortest path bridging protocol for Ethernet backbone network", International Conference on Information Networking (ICOIN).
  3. http://standards. ieee. org/news/2012/802. 1aq. html.
  4. Ashwood-Smith,P. 2011. Shortest Path Bridging IEEE 802. 1aq Overview.
  5. https://resources. sei. cmu. edu/asset_files/WhitePaper/2001_019_001_52488. pdf
  6. Saman, T. Z. , Joshi, J. , Tipper D. , 2013. "A Survey of Defense Mechanisms against Distributed Denial of Service (DDoS) Flooding Attacks" 15 (4). IEEE Communications Surveys & Tutorials.
  7. Breyer, R. and Riley,S. 1999. Switched, Fast, and Gigabit Ethernet. Macmillan,
  8. Metcalfe, R. and Boggs, D. 1976. "Ethernet: Distributed Packet Switching for Local Computer Networks", Communications of the ACM 19(7).
  9. IEEE Standard, 2004. 802. 1D IEEE Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges, IEEE.
  10. Allan,D. , Nigel. B. , 2012. "802. 1aq Shortest Path Bridging Design and Evolution," IEEE Press.
  11. Allan,D. , Nigel. B. , 2012"Why the SPB Control Plane Looks as it does," in 802. 1aq Shortest Path Bridging: Design and Evolution the Architect's Perspective, New York, IEEE Press.
  12. No, G. , Ra,I. ,2011. Adaptive DDoS Detector Design Using Fast Entropy Computation Method in 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (ICIMISUC).
  13. Shi, Y. , Eberhart,R. 1999. Empirical study of Particle swarm optimization in proc. of IEEE International Conference on Evolutionary Computation (ICEC).
  14. Yu, P. , Li,Y. 2012. Adaptive DDoS detection approach based on improved Renyi entropy, Journal of Computational Information Systems.
Index Terms

Computer Science
Information Sciences

Keywords

Shortest Path Bridging Ddos Attack Security-conscious Vlan Ethernet Intruders Stp