IP Address-Based Mitigation Against Denial-of-Service Flooding Attacks

被引:1
|
作者
Patil, Arvind R. Bhagat [1 ]
Thakur, Nileshsingh, V [2 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Nagpur, Maharashtra, India
[2] Nagpur Inst Technol, Nagpur, Maharashtra, India
关键词
Denial of service; Flood attack; Mitigation; Internet of Things; DDOS ATTACKS; DEFENSE;
D O I
10.1007/978-981-13-1747-7_36
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial-of-service attacks have grown bigger and sophisticated over the years. The alarming number of online services became the targets of DDoS attacks. Emergence of Internet of Things (IOT) has made the situations devastating for the organizations. The flooding attacks are frequently launched by attackers. These attacks consume vital resources of the target resulting into degradation in quality of service and huge financial losses. Hence, it became necessary to design lightweight detection and mitigation approach. In this paper, the presented approach is based on IP address. The IPs are classified as known and unknown based on lists maintained at the target end. The packet filtering decisions are taken based on arrival of known/unknown source IP addresses, volume of incoming requests from these IPs and CPU utilization threshold of the target. The approach mitigates the attack impact for different patterns of attacks. The performance evaluation of the proposed mechanism is done using qualitative and quantitative parameters.
引用
收藏
页码:377 / 389
页数:13
相关论文
共 50 条
  • [1] Mitigation Against Denial-of-Service Flooding and Malformed Packet Attacks
    Patil, Arvind R. Bhagat
    Thakur, Nileshsingh V.
    THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, 2019, 797 : 335 - 342
  • [2] An IP traceback technique against denial-of-service attacks
    Chen, ZL
    Lee, MC
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 96 - 104
  • [3] Defending against flooding-based distributed denial-of-service attacks: A tutorial
    Chang, RKC
    IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 42 - 51
  • [4] IP TRACEBACK SYSTEM FOR DENIAL-OF-SERVICE ATTACKS
    Tritilanunt, Suratose
    Salakit, Thananon
    Achwacheewanthornkul, Patchpon
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1867 - 1870
  • [5] Fast detection of denial-of-service attacks on IP telephony
    Sengar, Hemant
    Wang, Haining
    Wijesekera, Duminda
    Jajodia, Sushil
    2006 14TH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, PROCEEDINGS, 2006, : 199 - +
  • [6] Coping with Denial-of-Service Attacks on the IP Telephony System
    Cadet, Frantz
    Fokum, Daniel T.
    SOUTHEASTCON 2016, 2016,
  • [7] Securing hybrid wired/mobile IP networks from TCP-flooding based Denial-of-Service attacks
    Taleb, T
    Nishiyama, H
    Kato, N
    Nemoto, Y
    GLOBECOM '05: IEEE Global Telecommunications Conference, Vols 1-6: DISCOVERY PAST AND FUTURE, 2005, : 2907 - 2911
  • [8] Denial-of-service attacks
    Neumann, PG
    COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 136 - 136
  • [9] Statistical signatures for early detection of flooding denial-of-service attacks
    Haggerty, J
    Shi, Q
    Merabti, M
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 327 - 341
  • [10] An innovative approach to identify the IP address in denial-of-service (DoS) attacks based on Cauchy's integral theorem
    Viana, Mateus Mosca
    Rios, Riverson
    de Castro Andrade, Rossana Maria
    de Souza, Jose Neuman
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2009, 19 (04) : 339 - 354