A Preventive Measure to Protect from Denial of Service Attack

被引:0
|
作者
Dasmohapatra, Manas Ku [1 ]
Datta, Kamalika [1 ]
Sengupta, Indranil
机构
[1] KIIT Univ, Sch Comp Engn, Bhubaneswar 756024, Orissa, India
关键词
DOS Attacks; Analyzer; Authentication; Network Security; Flash Function; Database;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the number of users in the internet is increasing rapidly, various attacks are becoming an important issue which needs to be analyzed at the earliest. There exist various attacks like, ARP poisoning, IP spoofing, Denial of Service (DOS) etc. Now-a-days one of the major threats on the internet is Denial of Service (DOS) attack. As this attack slows down a particular system, the resources of that system becomes unavailable to others. DOS attack is mounted by consuming the resources of the victim system. By doing this, it can no longer provide the normal service to others. As the universe of DOS attack is large, there exists various different kind of DOS attacks like Distributive DOS attack, Low rate DOS attack etc. In this paper we have proposed a simple hashing based authentication technique which can protect computers from different DOS attacks. The main contribution of this paper is that, here prior to making a connection between source and destination, an authentication must take place at network layer. So before sending a packet to upper layer protocol such as TCP or UDP, this technique will ensure the authentication of the source in network layer. Here a Hash based DOS Attack Analyzer (HDAA) is used whose main job is to capture the packets in the network layer and perform an authentication. For the proposed method it; is necessary for both source and destination to agree upon a set of rules and to pass the authentication process. If authentication passes, then it will deliver the data packet to upper layer protocol. If authentication does not pass then it will drop that packet and block that source address from entering the network. A thorough analysis have been made and compared with some existing techniques. The main advantage of this method lies in the application of simple hashing method in network layer which restricts the packet from entering our system initially. The computation overhead is also very less as this scheme can be implemented in network layer with respect to other techniques.
引用
收藏
页码:157 / +
页数:2
相关论文
共 50 条
  • [1] A survey of Distributed Denial of Service attack
    Mallikarjunan, K. Narasimha
    Muthupriya, K.
    Shalinie, S. Mercy
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [2] Analysis of a denial of service attack on TCP
    Schuba, CL
    Krsul, IV
    Kuhn, MG
    Spafford, EH
    Sundaram, A
    Zamboni, D
    1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 208 - 223
  • [3] Denial of Service Attack on IoT System
    Chen, Qifeng
    Chen, Haoming
    Cai, Yanpu
    Zhang, Yanqi
    Huang, Xin
    2018 NINTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME 2018), 2018, : 755 - 758
  • [4] Massive distributed denial of service attack
    不详
    COMPUTERS & SECURITY, 2003, 22 (06) : 465 - 465
  • [5] New denial of service attack on Internet
    Hancock, B
    COMPUTERS & SECURITY, 2000, 19 (04) : 309 - 310
  • [6] Simulation of IP traceback for the denial of service attack
    Yamana, M
    Hirata, K
    Shimizu, H
    Nakatani, H
    Kai, T
    Tsukamoto, K
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 110 - 113
  • [7] Implementation and comparison of denial of service attack techniques
    Elleithy, KM
    Blagovic, D
    Cheng, W
    Sideleau, P
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 336 - 341
  • [8] Defend Against Denial of Service Attack with VMM
    Zhao, Siqin
    Chen, Kang
    Zheng, Weimin
    2009 EIGHTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2009, : 91 - 96
  • [9] A Denial of Service Attack Method for an IoT System
    Liang, Lulu
    Zheng, Kai
    Sheng, Qiankun
    Huang, Xin
    2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2016, : 360 - 364
  • [10] Denial of Service Attack in Software Defined Network
    Bera, Piu
    Saha, Ankita
    Setua, S. K.
    PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2016, : 497 - 501