Mitigating the Effect of Distributed Denial of Service Attack
Lavlish Goyal1 , Nitika 2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-3 , Page no. 1032-1035, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10321035
Online published on Mar 31, 2019
Copyright © Lavlish Goyal, Nitika . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Lavlish Goyal, Nitika, “Mitigating the Effect of Distributed Denial of Service Attack,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1032-1035, 2019.
MLA Style Citation: Lavlish Goyal, Nitika "Mitigating the Effect of Distributed Denial of Service Attack." International Journal of Computer Sciences and Engineering 7.3 (2019): 1032-1035.
APA Style Citation: Lavlish Goyal, Nitika, (2019). Mitigating the Effect of Distributed Denial of Service Attack. International Journal of Computer Sciences and Engineering, 7(3), 1032-1035.
BibTex Style Citation:
@article{Goyal_2019,
author = {Lavlish Goyal, Nitika},
title = {Mitigating the Effect of Distributed Denial of Service Attack},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {1032-1035},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3960},
doi = {https://doi.org/10.26438/ijcse/v7i3.10321035}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.10321035}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3960
TI - Mitigating the Effect of Distributed Denial of Service Attack
T2 - International Journal of Computer Sciences and Engineering
AU - Lavlish Goyal, Nitika
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 1032-1035
IS - 3
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
350 | 256 downloads | 159 downloads |
Abstract
As the WORLD WIDE WEB (WWW) has been drawing in more business and transaction to be actualized over the Internet, it also has attracted web server attackers having malicious intends. Among different attacks possible against the web server, Distributed Denial of Service (DDoS) attack is the most harmful kind of thread, as it is hard to detect and dispose of completely. The use of spoofed IP addresses to launch DDoS makes it even much harder to identify the source of an attack. In DDoS, attack traffic resembles to legitimate traffic and difficult to differentiate. Still, there are some features which can be used to differentiate normal request from the malicious ones. The source IP distribution is one of the features. In the proposed mechanism a data structure is maintained at victim server which is used to decide priority among different requests during DDoS based on previous visit history and source IP distribution of that server. In the descending order of priority, the server serves the request of users at the time of DDoS.
Key-Words / Index Term
DDoS; IP spoofing; Source distribution; Priority; Defence
References
[1] Peng, Tao, Christopher Leckie, and Kotagiri Ramamohanarao. "Survey of network-based defense mechanisms countering the DoS and DDoS problems." ACM Computing Surveys (CSUR) 39.1 (2007): 3.
[2] http://tools.ietf.org/html/rfc4987
[3] Quyen Le; Zhanikeev, M.; Tanaka, Y., "Methods of Distinguishing Flash Crowds from Spoofed DoS Attacks," Next Generation Internet Networks, 3rd EuroNGI Conference on , vol., no., pp.167,173, 21-23 May 2007.
[4] Ferguson, Paul. "Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing." (2000).
[5] K. Park, and H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in Proc. IEEE INFOCOM 2001, pp. 338347.
[6] T. Peng, C. Leckie, and K. Ramamohanarao, Protection from distributed denial of service attacks using history-based IP filtering, ICC ’03. May , Vol.1, pp: 482- 486, 2002.
[7] Jin, Cheng, Haining Wang, and Kang G. Shin. "Hop-count filtering: an effective defense against spoofed DDoS traffic." Proceedings of the 10th ACM conference on Computer and communications security. ACM, 2003.
[8] WorldCup 98 and NASA Web server logs are available on the Internet Traffic Archive: http://ita.ee.lbl.gov/html/traces.html