IP Address-Based Mitigation Against Denial-of-Service Flooding Attacks

被引:1
|
作者
Patil, Arvind R. Bhagat [1 ]
Thakur, Nileshsingh, V [2 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Nagpur, Maharashtra, India
[2] Nagpur Inst Technol, Nagpur, Maharashtra, India
关键词
Denial of service; Flood attack; Mitigation; Internet of Things; DDOS ATTACKS; DEFENSE;
D O I
10.1007/978-981-13-1747-7_36
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial-of-service attacks have grown bigger and sophisticated over the years. The alarming number of online services became the targets of DDoS attacks. Emergence of Internet of Things (IOT) has made the situations devastating for the organizations. The flooding attacks are frequently launched by attackers. These attacks consume vital resources of the target resulting into degradation in quality of service and huge financial losses. Hence, it became necessary to design lightweight detection and mitigation approach. In this paper, the presented approach is based on IP address. The IPs are classified as known and unknown based on lists maintained at the target end. The packet filtering decisions are taken based on arrival of known/unknown source IP addresses, volume of incoming requests from these IPs and CPU utilization threshold of the target. The approach mitigates the attack impact for different patterns of attacks. The performance evaluation of the proposed mechanism is done using qualitative and quantitative parameters.
引用
收藏
页码:377 / 389
页数:13
相关论文
共 50 条
  • [31] Distributed denial-of-service attacks against HTTP/2 services
    Erwin Adi
    Zubair A. Baig
    Philip Hingston
    Chiou-Peng Lam
    Cluster Computing, 2016, 19 : 79 - 86
  • [32] Resilient Consensus of Multiagent Systems Against Denial-of-Service Attacks
    Zuo, Zhiqiang
    Cao, Xiong
    Wang, Yijing
    Zhang, Wentao
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (04): : 2664 - 2675
  • [33] Distributed denial-of-service attacks against HTTP/2 services
    Adi, Erwin
    Baig, Zubair A.
    Hingston, Philip
    Lam, Chiou-Peng
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 79 - 86
  • [34] Denying denial-of-service attacks: A router based solution
    Zhang, S
    Dasgupta, P
    IC'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2003, : 301 - 307
  • [35] Investigation of Simple Denial-of-Service Attacks
    Voitovych, Olesya
    Baryshev, Yurii
    Kolibabchuk, Eduard
    Kupershtein, Leonid
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 145 - 148
  • [36] Denial-of-service attacks and countermeasures on BitTorrent
    Lehmann, Matheus Brenner
    Santos, Flavio Roberto
    Gaspary, Luciano Paschoal
    Barcellos, Marinho Pilla
    COMPUTER NETWORKS, 2012, 56 (15) : 3479 - 3498
  • [37] Denial-of-service attacks rip the Internet
    Garber, L
    COMPUTER, 2000, 33 (04) : 12 - 17
  • [38] Optimizing the pulsing denial-of-service attacks
    Luo, XP
    Chang, RKC
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 582 - 591
  • [39] Speculative Denial-of-Service Attacks in Ethereum
    Yaish, Aviv
    Qin, Kaihua
    Zhou, Liyi
    Zohar, Aviv
    Gervais, Arthur
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3531 - 3548
  • [40] Handling Distributed Denial-of-Service Attacks
    Janczewski, Lech J.
    Information Security Technical Report, 2001, 6 (03): : 37 - 44