A Preventive Measure to Protect from Denial of Service Attack

被引:0
|
作者
Dasmohapatra, Manas Ku [1 ]
Datta, Kamalika [1 ]
Sengupta, Indranil
机构
[1] KIIT Univ, Sch Comp Engn, Bhubaneswar 756024, Orissa, India
关键词
DOS Attacks; Analyzer; Authentication; Network Security; Flash Function; Database;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the number of users in the internet is increasing rapidly, various attacks are becoming an important issue which needs to be analyzed at the earliest. There exist various attacks like, ARP poisoning, IP spoofing, Denial of Service (DOS) etc. Now-a-days one of the major threats on the internet is Denial of Service (DOS) attack. As this attack slows down a particular system, the resources of that system becomes unavailable to others. DOS attack is mounted by consuming the resources of the victim system. By doing this, it can no longer provide the normal service to others. As the universe of DOS attack is large, there exists various different kind of DOS attacks like Distributive DOS attack, Low rate DOS attack etc. In this paper we have proposed a simple hashing based authentication technique which can protect computers from different DOS attacks. The main contribution of this paper is that, here prior to making a connection between source and destination, an authentication must take place at network layer. So before sending a packet to upper layer protocol such as TCP or UDP, this technique will ensure the authentication of the source in network layer. Here a Hash based DOS Attack Analyzer (HDAA) is used whose main job is to capture the packets in the network layer and perform an authentication. For the proposed method it; is necessary for both source and destination to agree upon a set of rules and to pass the authentication process. If authentication passes, then it will deliver the data packet to upper layer protocol. If authentication does not pass then it will drop that packet and block that source address from entering the network. A thorough analysis have been made and compared with some existing techniques. The main advantage of this method lies in the application of simple hashing method in network layer which restricts the packet from entering our system initially. The computation overhead is also very less as this scheme can be implemented in network layer with respect to other techniques.
引用
收藏
页码:157 / +
页数:2
相关论文
共 50 条
  • [21] Modeling and simulation for detecting a distributed denial of service attack
    Seo, HS
    Cho, HT
    AL 2002: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2002, 2557 : 179 - 190
  • [22] Attack Detection of Distributed Denial of Service Based on Splunk
    Su, Te-Jen
    Wang, Shih-Ming
    Chen, Yi-Feng
    Liu, Chao-Liang
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS FOR SCIENCE AND ENGINEERING (IEEE-ICAMSE 2016), 2016, : 397 - 400
  • [23] An Intelligence Technique for Denial of Service (DoS) Attack Detection
    Manan, Wan Nurulsafawati Wan
    Safiuddin, Tuan Muhammad
    Dzolkhifli, Zarina
    Hassin, Mohd Hafiz Mohd
    ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7446 - 7450
  • [24] Honeypot Scheme for Distributed Denial-of-Service Attack
    Das, Vinu V.
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 497 - 501
  • [25] Characterization and Comparison of Distributed Denial of Service Attack Tools
    Kaur, Harjeet
    Behal, Sunny
    Kumar, Krishan
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1139 - 1145
  • [26] The Solution of Denial of Service Attack on Ordered Broadcast Intent
    Oh, Ji-Soo
    Park, Min-Woo
    Chung, Tai-Myoung
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 397 - 400
  • [27] On Implicit Denial of Service Attack in NDN and Potential Mitigations
    Panwar, Gaurav
    Tourani, Reza
    Mick, Travis
    Misra, Satyajayant
    Mtibaa, Abderrahmen
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2018,
  • [28] An Effective Performance For Denial Of Service Attack (DoS) Detection
    Hemalatha, P.
    Vijithaananthi, J.
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 229 - 233
  • [29] Intrusion detection of distributed denial of service attack in cloud
    Velliangiri, S.
    Premalatha, J.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10615 - 10623
  • [30] A Denial of Service Attack in Advanced Metering Infrastructure Network
    Yi, Ping
    Zhu, Ting
    Zhang, Qingquan
    Wu, Yue
    Li, Jianhua
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 1029 - 1034