Analysis on DDoS Attack using a Probabilistic Approach

Authors

  • Dr. B. Mukunthan  Research Advisor, Jairam's Arts and Science College,Karur, Tamilnadu, India
  • S. Dhayananthi  Research Advisor, Jairam's Arts and Science College,Karur, Tamilnadu, India

Keywords:

DoS, Hop-Count Filtering, Hop-Count Inspection, spoofed, ns2, matlab

Abstract

In the concepts of DDoS attackers, the researchers have taken two approaches. The first approach improves the routing infrastructures whereas the second approach protects Internet servers with sophisticated resource manage-ment to the servers. This end system approach provides more accurate resource accounting, and fine-grained service isolation and differentiation for example, to shield interactive video traffic from FTP traffic. However, without a mechanism to detect spoofed traffic, spoofed packets will share the same resource principals and code paths as legitimate requests. While a resource manager can confine the scope of damage to the particular service under attack, it cannot sustain the availability of that service. In stark contrast, the server's ability to filter most, if not all, spoofed IP packets can help sustain service availability even under DDoS attacks. Since filtering spoofed IP packets is orthogonal to resource management, it can also be used in conjunction with advanced resource-management schemes.

References

  1. S. Specht and R. Lee. "Taxonomies of distributed denial of service networks, attacks, tools, and countermeasures", Technical Report CE-L2003-03, 164, May 2003.
  2. http://www.w3.org/security/faq/wwwsf6.html.
  3. Graham Wheeler. Denial-of-service:courting disaster. Technical Re-port,CEQURUX Technologies.
  4. Haining Wang , Cheng Jin and Kang G. Shin. Hop-count filtering: "An effective defense against spoofed traffic", Technical Report,The Pennsylvania State University, 2003.
  5. Christos Douligeris and Aikaterini Mitrokotsa. Ddos attacks and defense mechanisms: "A classi¯cations. Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technolog"y, pages 190-193, December 2003.
  6. http://www.wired.com/news/business/0,1367,34221, 00.html Yahoo on Trail of Site Hackers, February 2000.
  7. Ceilyn Boyd John Zao David Mankins, Rajesh Krishnan and Michael Frentz. Mitigating distributed denial of service attacks with dynamic resource pricing. Proceedings of 17th Annual Conference on Computer Security Applications , 2001. ACSAC 2001, pages 411-421, 2001.
  8. M. Fullmer and S. Romig. The osu °ow-tools package and cisco netflowlogs. In Proceedings of USENIX LISA'2000, New Orleans, LA, December 2000

Downloads

Published

2018-07-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. B. Mukunthan, S. Dhayananthi, " Analysis on DDoS Attack using a Probabilistic Approach, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 9, pp.185-190, July-August-2018.