IP Address-Based Mitigation Against Denial-of-Service Flooding Attacks

被引:1
|
作者
Patil, Arvind R. Bhagat [1 ]
Thakur, Nileshsingh, V [2 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Nagpur, Maharashtra, India
[2] Nagpur Inst Technol, Nagpur, Maharashtra, India
关键词
Denial of service; Flood attack; Mitigation; Internet of Things; DDOS ATTACKS; DEFENSE;
D O I
10.1007/978-981-13-1747-7_36
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial-of-service attacks have grown bigger and sophisticated over the years. The alarming number of online services became the targets of DDoS attacks. Emergence of Internet of Things (IOT) has made the situations devastating for the organizations. The flooding attacks are frequently launched by attackers. These attacks consume vital resources of the target resulting into degradation in quality of service and huge financial losses. Hence, it became necessary to design lightweight detection and mitigation approach. In this paper, the presented approach is based on IP address. The IPs are classified as known and unknown based on lists maintained at the target end. The packet filtering decisions are taken based on arrival of known/unknown source IP addresses, volume of incoming requests from these IPs and CPU utilization threshold of the target. The approach mitigates the attack impact for different patterns of attacks. The performance evaluation of the proposed mechanism is done using qualitative and quantitative parameters.
引用
收藏
页码:377 / 389
页数:13
相关论文
共 50 条
  • [41] A Comprehensive Review of Distributed Denial-of-Service (DDoS) Attacks: Techniques and Mitigation Strategies
    Alomari, Mariam
    Alsadah, Sharifa
    Aldahmash, Noura
    Alghulaygah, Hana
    Alogaiel, Razan
    Saqib, Nazar Abbas
    PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 215 - 222
  • [42] Securing a Wireless Network-on-Chip against Jamming based Denial-of-Service Attacks
    Vashist, Abhishek
    Keats, Andrew
    Dinakarrao, Sai Manoj Pudukotai
    Ganguly, Amlan
    2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, : 321 - 326
  • [43] Design and Development of Proactive Models for Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks
    Nagesh, H. R.
    Sekaran, K. Chandra
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 168 - 176
  • [44] PacketScore:: Statistics-based overload control against distributed denial-of-service attacks
    Kim, Y
    Lau, WC
    Chuah, MC
    Chao, HJ
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2594 - 2604
  • [45] Leader: Defense Against Exploit-Based Denial-of-Service Attacks onWeb Applications
    Tandon, Rajat
    Wang, Haoda
    Weideman, Nicolaas
    Arakelyan, Shushan
    Bartlett, Genevieve
    Hauser, Christophe
    Mirkovic, Jelena
    PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 744 - 758
  • [46] PFS: Probabilistic Filter Scheduling Against Distributed Denial-of-Service Attacks
    Seo, Dongwon
    Lee, Heejo
    Perrig, Adrian
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 9 - 17
  • [47] Applying pattern detection network security against Denial-of-Service attacks
    Tsvetanov, Tsvetomir
    Simeonov, Stanislav
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VII, PROCEEDINGS, 2006, : 314 - +
  • [48] Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor
    Jansen, Rob
    Vaidya, Tavish
    Shen, Micah
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1823 - 1840
  • [49] Using adaptive router throttles against distributed denial-of-service attacks
    Liang, Feng
    Yau, David
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (07): : 1220 - 1227
  • [50] Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
    Tan, Zhiyuan
    Jamdagni, Aruna
    He, Xiangjian
    Nanda, Priyadarsi
    Liu, Ren Ping
    Hu, Jiankun
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) : 2519 - 2533