Open Access   Article Go Back

Mitigating the Effect of Distributed Denial of Service Attack

Lavlish Goyal1 , Nitika 2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 1032-1035, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.10321035

Online published on Mar 31, 2019

Copyright © Lavlish Goyal, Nitika . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Lavlish Goyal, Nitika, “Mitigating the Effect of Distributed Denial of Service Attack,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1032-1035, 2019.

MLA Style Citation: Lavlish Goyal, Nitika "Mitigating the Effect of Distributed Denial of Service Attack." International Journal of Computer Sciences and Engineering 7.3 (2019): 1032-1035.

APA Style Citation: Lavlish Goyal, Nitika, (2019). Mitigating the Effect of Distributed Denial of Service Attack. International Journal of Computer Sciences and Engineering, 7(3), 1032-1035.

BibTex Style Citation:
@article{Goyal_2019,
author = {Lavlish Goyal, Nitika},
title = {Mitigating the Effect of Distributed Denial of Service Attack},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {1032-1035},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3960},
doi = {https://doi.org/10.26438/ijcse/v7i3.10321035}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.10321035}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3960
TI - Mitigating the Effect of Distributed Denial of Service Attack
T2 - International Journal of Computer Sciences and Engineering
AU - Lavlish Goyal, Nitika
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 1032-1035
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
311 234 downloads 133 downloads
  
  
           

Abstract

As the WORLD WIDE WEB (WWW) has been drawing in more business and transaction to be actualized over the Internet, it also has attracted web server attackers having malicious intends. Among different attacks possible against the web server, Distributed Denial of Service (DDoS) attack is the most harmful kind of thread, as it is hard to detect and dispose of completely. The use of spoofed IP addresses to launch DDoS makes it even much harder to identify the source of an attack. In DDoS, attack traffic resembles to legitimate traffic and difficult to differentiate. Still, there are some features which can be used to differentiate normal request from the malicious ones. The source IP distribution is one of the features. In the proposed mechanism a data structure is maintained at victim server which is used to decide priority among different requests during DDoS based on previous visit history and source IP distribution of that server. In the descending order of priority, the server serves the request of users at the time of DDoS.

Key-Words / Index Term

DDoS; IP spoofing; Source distribution; Priority; Defence

References

[1] Peng, Tao, Christopher Leckie, and Kotagiri Ramamohanarao. "Survey of network-based defense mechanisms countering the DoS and DDoS problems." ACM Computing Surveys (CSUR) 39.1 (2007): 3.
[2] http://tools.ietf.org/html/rfc4987
[3] Quyen Le; Zhanikeev, M.; Tanaka, Y., "Methods of Distinguishing Flash Crowds from Spoofed DoS Attacks," Next Generation Internet Networks, 3rd EuroNGI Conference on , vol., no., pp.167,173, 21-23 May 2007.
[4] Ferguson, Paul. "Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing." (2000).
[5] K. Park, and H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in Proc. IEEE INFOCOM 2001, pp. 338347.
[6] T. Peng, C. Leckie, and K. Ramamohanarao, Protection from distributed denial of service attacks using history-based IP filtering, ICC ’03. May , Vol.1, pp: 482- 486, 2002.
[7] Jin, Cheng, Haining Wang, and Kang G. Shin. "Hop-count filtering: an effective defense against spoofed DDoS traffic." Proceedings of the 10th ACM conference on Computer and communications security. ACM, 2003.
[8] WorldCup 98 and NASA Web server logs are available on the Internet Traffic Archive: http://ita.ee.lbl.gov/html/traces.html