Open Access   Article Go Back

Controlling Distributed Denial-of-Service Attacks through Dynamic Path Identifiers

N. Vijay1 , M. Sakthivel2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1085-1093, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.10851093

Online published on Jul 31, 2018

Copyright © N. Vijay, M. Sakthivel . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N. Vijay, M. Sakthivel, “Controlling Distributed Denial-of-Service Attacks through Dynamic Path Identifiers,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1085-1093, 2018.

MLA Style Citation: N. Vijay, M. Sakthivel "Controlling Distributed Denial-of-Service Attacks through Dynamic Path Identifiers." International Journal of Computer Sciences and Engineering 6.7 (2018): 1085-1093.

APA Style Citation: N. Vijay, M. Sakthivel, (2018). Controlling Distributed Denial-of-Service Attacks through Dynamic Path Identifiers. International Journal of Computer Sciences and Engineering, 6(7), 1085-1093.

BibTex Style Citation:
@article{Vijay_2018,
author = {N. Vijay, M. Sakthivel},
title = {Controlling Distributed Denial-of-Service Attacks through Dynamic Path Identifiers},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1085-1093},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2566},
doi = {https://doi.org/10.26438/ijcse/v6i7.10851093}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.10851093}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2566
TI - Controlling Distributed Denial-of-Service Attacks through Dynamic Path Identifiers
T2 - International Journal of Computer Sciences and Engineering
AU - N. Vijay, M. Sakthivel
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1085-1093
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
459 210 downloads 128 downloads
  
  
           

Abstract

A Distributed Denial of Service flooding attack in the network performed implicitly and as well as explicitly by the attacker or victim. This attempt is performed to overload the server, generate malicious traffic or interrupting the service. This issue crashes the host and the host’s service will be unavailable to the legitimate users. The enterprise, employment, and assessment of D-PID, a basis that uses PIDs transferred between adjacent domains as inter-domain routing objects. In DPID, the PID of an inter-domain path linking two domains is reserved clandestine and changes animatedly. We label in part how neighbouring domains negotiate PIDs, how to uphold constant communications when PIDs change. We shape a 42-node sample comprised by six domains to prove D-PID’s possibility and demeanour widespread admirations to gauge its efficacy and charge.

Key-Words / Index Term

Inter-domain routing, security, Distributed Denail-of-Service (DDoS), path identifiers

References

[1]Francois, I. Aib, and R. Boutaba, “Firecol: a Collaborative Protection Network for the Detection of Flooding ddos Attacks,” IEEE/ACM Trans.on Netw., vol. 20, no. 6, Dec. 2012, pp. 1828-1841.
[2] OVH hosting suffers 1Tbps DDoS attack: largest Internet has ever seen. [Online] Available: https: //www.hackread.com/ovh-hostingsuffers- 1tbps- ddos-attack/.
[3] 602 Gbps! This May Have Been the Largest DDoS AttackinHistory.http://thehackernews.com/2016/01/biggest-ddos-attack.html.
[4] S. T. Zargar, J. Joshi, D. Tipper, “A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks,” IEEECommun. Surv. & Tut., vol. 15, no. 4, pp. 2046 - 2069, Nov. 2013.
[5] P. Ferguson and D. Senie, “Network Ingress Filtering: Defeating Denial of Service Attacks that Employ IP Source Address Spoofing,” IETF Internet RFC 2827, May 2000.
[6] K. Park and H. Lee, “On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets,” In Proc. SIGCOMM’01, Aug. 2001, San Diego, CA, USA.
[7] A. Yaar, A. Perrig, D. Song, “StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense,” IEEE J. on Sel. Areas in Commun., vol. 24, no. 10, pp. 1853 - 1863, Oct. 2006.
[8] H. Wang, C. Jin, K. G. Shin, “Defense Against Spoofed IP Traffic Using Hop-Count Filtering,” IEEE/ACM Trans. on Netw., vol. 15, no. 1, pp. 40 - 53, Feb. 2007.
[9] Z. Duan, X. Yuan, J. Chandrashekar, “Controlling IP Spoofing through Interdomain Packet Filters,” IEEE Trans. on Depend. and Secure Computing, vol. 5, no. 1, pp. 22 - 36, Feb. 2008.
[10] S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Practical Network Support for IP Traceback,” In Proc. SIGCOMM’00, Aug. 2000, Stockholm, Sweden.
[11] A. C. Snoeren, C. Partridge, L. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer, “Hash-Based IP Traceback,” In Proc.SIGCOMM’01, Aug. 2001, San Diego, CA, USA.
[12] M. Sung, J. Xu, “IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks,” IEEE Trans. OnParall. and Distr. Sys., vol. 14, no. 9, pp. 861 - 872, Sep. 2003.
[13] M. Sung, J. Xu, J. Li, L. Li, “Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Information-Theoretic Foundation,” IEEE/ACM Trans. on Netw., vol. 16, no. 6, pp. 1253 - 1266, Dec. 2008.
[14] Y. Xiang, K. Li, W. Zhou, “Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics,” IEEE Trans. on Inf.Foren. and Sec., vol. 6, no. 2, pp. 426 - 437, May 2011.
[15] H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, S. Shenker, “Off by default!,” In Proc. HotNets-IV, Nov. 2005, College Park, MD, USA.
[16] A. Yaar, A. Perrig, and D. Song, “SIFF: a stateless internet flow filter to mitigate DDoS flooding attacks,” In Proc. IEEE Symposium on Securityand Privacy, May 2004, Oakland, CA, USA.
[17] B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y. Hu, “Portcullis: Protecting connection setup from denial-of-capability attacks,” In Proc. SIGCOMM’07, Aug.2007, Kyoto, Japan.
[18] X. Yang, D. Wetherall, and T. Anderson, “TVA: A DoS-Limiting Network Architecture,” IEEE/ACM Trans. on Netw., vol. 16, no. 3, pp. 1267 - 1280, Jun. 2008.
[19] X. Liu, X. Yang, and Y. Lu, “To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets,” In Proc. SIGCOMM’ 08, Aug. 2008, Seattle, WA, USA.
[20] D. G. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker, “Accountable Internet Protocol (AIP),” In Proc. SIGCOMM’ 08, Aug. 2008, Seattle, WA, USA.
[21] P. B. Godfrey, I. Ganichev, S. Shenker, and I. Stoica, “Pathlet routing,” in Proc. SIGCOMM’09, Aug. 2009, Barcelona, Spain, pp. 111 - 122.
[22] T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, P. B. Godfrey, N. McKwoen, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, D. Kuptsov, “Architecting for innovation,” ACM Comput. Commun. Rev., vol. 41, no. 3, July 2011, pp. 24 - 36.
[23] P. Jokela, A. Zahemszky, C. E. Rothenberg, S. Arianfar, P. Nikander, “LIPSIN: Line Speed Publish/Subscribe Inter- networking,” in Proc. SIGCOMM’09, Aug. 2009, Barcelona, Spain, pp. 195 - 206.
[24] H. Luo, Z. Chen, J. Cui, H. Zhang, M. Zukerman, C. Qiao, “CoLoR: an information-centric internet architecture for innovations,” IEEE Network, vol. 28, no. 3, pp. 4 - 10, May 2014.
[25] L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, kc claffy, P. Crowley, C. Papadopoulos, L. Wang, and B. Zhang, “Named data networking,” ACM Comput. Commun. Rev., vol. 44, no. 3, pp. 66 - 73, Jul. 2014.
[26] T. Koponen, M. Chawla, B. C G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, I. Stoica, “A data-oriented (and beyond) network architecture,” in Proc. SIGCOMM’07, Aug. 2007, Kyoto, Japan, pp. 181 - 192.
[27] D. Raychaudhuri, K. Nagaraja, A. Venkataramani, “MobilityFirst: a robust and trustworthy mobility-centric architecture for the future Internet,” Mobile Comput. and Comm. Rev., vol. 16, no. 3, pp. 2 - 13, Jul. 2012.
[28] M. Antikainen, T. Aura, M. Sarela, “Denial-of-service attacks in bloomfilter- based forwarding,” IEEE/ACM Trans. on Netw., vol. 22, no. 5, pp. 1463 - 1476, Oct. 2014.
[29] BGP Peer Report. http://bgp.he.net/report/peers/.