Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack

被引:0
|
作者
Shunmuganathan, Saraswathi [1 ]
机构
[1] Sri Sivasubramaniya Nadar Coll Engn, Dept Comp Sci & Engn, Chennai 603110, Tamil Nadu, India
来源
关键词
Flooding; spoofing; cooperative solution; multilevel security; filtering; pushback; DDOS;
D O I
10.32604/csse.2023.023858
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential advancement in telecommunication embeds the Internet in every aspect of communication. Interconnections of networks all over the world impose monumental risks on the Internet. A Flooding Attack (FA) is one of the major intimidating risks on the Internet where legitimate users are prevented from accessing network services. Irrespective of the protective measures incorporated in the communication infrastructure, FA still persists due to the lack of global cooperation. Most of the existing mitigation is set up either at the traffic starting point or at the traffic ending point. Providing mitigation at one or the other end may not be a complete solution. To insist on better protection against flooding attacks, this work proposes a cooperative multilevel defense mechanism. The proposed cooperative multilevel defense mechanism consists of two-level of mitigation. In the first level, it is proposed to design a Threshold-based rate-limiting with a Spoofing Resistant Tag (TSRT), as a source end countermeasure for High-Rate Flooding Attacks (HRFA) and spoofing attacks. In the second level, the accent is to discriminate normal traffic after Distributed Denial of Service (DDoS) traffic and drop the DDoS traffic at the destination end. Flow Congruence-based Selective Pushback (FCSP), as a destination-initiated countermeasure for the Low Rate Flooding Attack (LRFA). The source and the destination cooperate to identify and block the attack. A key advantage of this cooperative mechanism is that it can distinguish and channel down the attack traffic nearer to the starting point of the attack. The presentation of the agreeable cooperative multilevel safeguard mechanism is approved through broad recreation in NS-2. The investigation and the exploratory outcomes show that the proposed plan can effectively identify and shield from the attack.
引用
收藏
页码:67 / 79
页数:13
相关论文
共 11 条
  • [1] An efficient and practical Defense method against DDoS attack at the source-end
    He, YX
    Chen, W
    Xiao, B
    Peng, WL
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS WORKSHOPS, VOL II, PROCEEDINGS,, 2005, : 265 - 269
  • [2] Source-end DDoS defense
    Mirkovic, J
    Prier, G
    Reihner, P
    SECOND IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2003, : 171 - 178
  • [3] Source-end Defense against SYN flooding attacks: An adaptive detection method
    Yu, Ming
    Chen, Weidong
    Zhou, Xiyuan
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1674 - 1677
  • [4] D-WARD: A source-end defense against flooding denial-of-service attacks
    Mirkovic, J
    Reiher, P
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) : 216 - 232
  • [5] Source-End DDoS Defense in IoT Environments
    Mergendahl, Samuel
    Sisodia, Devkishen
    Li, Jun
    Cam, Hasan
    PROCEEDINGS OF THE 2017 WORKSHOP ON INTERNET OF THINGS SECURITY AND PRIVACY (IOT S&P'17), 2017, : 63 - 64
  • [6] A Nonparametric Adaptive CUSUM Method and Its Application in Source-End Defense against SYN Flooding Attacks
    YU Ming School of Information and Communication Engineering
    WuhanUniversityJournalofNaturalSciences, 2011, 16 (05) : 414 - 418
  • [7] Adaptive detection of SYN flooding attacks at source-end networks
    School of Communication Engineering, Xidian University, Xi'an 710071, China
    不详
    Chin J Electron, 2008, 1 (141-144):
  • [8] Adaptive detection of SYN flooding attacks at source-end networks
    Yu, Ming
    Chen Weidong
    Zhou Xiyuan
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (01): : 141 - 144
  • [9] A SIP DoS Flooding Attack Defense Mechanism based on Priority Class Queue
    Wan Xiao-Yu
    Zhang Li
    Fan Zi-Fu
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 428 - 431
  • [10] Sentinel: Defense Mechanism against DDoS Flooding Attack in Software Defined Vehicular Network
    de Biasi, Gabriel
    Vieira, Luiz F. M.
    Loureiro, Antonio A. F.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,