A Preventive Measure to Protect from Denial of Service Attack

被引:0
|
作者
Dasmohapatra, Manas Ku [1 ]
Datta, Kamalika [1 ]
Sengupta, Indranil
机构
[1] KIIT Univ, Sch Comp Engn, Bhubaneswar 756024, Orissa, India
关键词
DOS Attacks; Analyzer; Authentication; Network Security; Flash Function; Database;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the number of users in the internet is increasing rapidly, various attacks are becoming an important issue which needs to be analyzed at the earliest. There exist various attacks like, ARP poisoning, IP spoofing, Denial of Service (DOS) etc. Now-a-days one of the major threats on the internet is Denial of Service (DOS) attack. As this attack slows down a particular system, the resources of that system becomes unavailable to others. DOS attack is mounted by consuming the resources of the victim system. By doing this, it can no longer provide the normal service to others. As the universe of DOS attack is large, there exists various different kind of DOS attacks like Distributive DOS attack, Low rate DOS attack etc. In this paper we have proposed a simple hashing based authentication technique which can protect computers from different DOS attacks. The main contribution of this paper is that, here prior to making a connection between source and destination, an authentication must take place at network layer. So before sending a packet to upper layer protocol such as TCP or UDP, this technique will ensure the authentication of the source in network layer. Here a Hash based DOS Attack Analyzer (HDAA) is used whose main job is to capture the packets in the network layer and perform an authentication. For the proposed method it; is necessary for both source and destination to agree upon a set of rules and to pass the authentication process. If authentication passes, then it will deliver the data packet to upper layer protocol. If authentication does not pass then it will drop that packet and block that source address from entering the network. A thorough analysis have been made and compared with some existing techniques. The main advantage of this method lies in the application of simple hashing method in network layer which restricts the packet from entering our system initially. The computation overhead is also very less as this scheme can be implemented in network layer with respect to other techniques.
引用
收藏
页码:157 / +
页数:2
相关论文
共 50 条
  • [31] IEEE 802.11 Denial of Service Attack Detection in MANET
    Soryal, Joseph
    Saadawi, Tarek
    2012 WIRELESS TELECOMMUNICATIONS SYMPOSIUM, 2012,
  • [32] A Denial of Service Attack in Advanced Metering Infrastructure Network
    Yi, Ping
    Zhu, Ting
    Zhang, Qingquan
    Wu, Yue
    Li, Jianhua
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 1029 - 1034
  • [33] Distributed Denial of Service attack on Cloud: Detection and Prevention
    Khadka, Bikram
    Withana, Chandana
    Alsadoon, Abeer
    Elchouemi, Amr
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [34] The Denial of Service Attack Analysis of WLAN Authentication Infrastructure
    Song Yubo
    Chen Xi
    Hu Aiqun
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 407 - +
  • [35] Blockchain as a Service for Software Defined Networks: A Denial of Service Attack Perspective
    Bose, Arnab
    Aujla, Gagangeet Singh
    Singh, Maninderpal
    Kumar, Neeraj
    Cao, Haotong
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 901 - 906
  • [36] Distributed Denial of Service Attack Prevention at Source Machines
    Misono, Masanori
    Yoshida, Kaito
    Hwang, Juho
    Shinagawa, Takahiro
    2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 488 - 495
  • [37] Design of Advanced Slow Denial of Service Attack Generator
    Sikora, Marek
    Krivulcik, Andrej
    Fujdiak, Radek
    Blazek, Petr
    2020 12TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2020), 2020, : 99 - 104
  • [38] SlowITe, a Novel Denial of Service Attack Affecting MQTT
    Vaccari, Ivan
    Aiello, Maurizio
    Cambiaso, Enrico
    SENSORS, 2020, 20 (10)
  • [39] The cicada attack: Degradation and denial of service in IR ranging
    Poturalski, Marcin
    Flury, Manuel
    Papadimitratos, Panos
    Hubaux, Jean-Pierre
    Le Boudec, Jean-Yves
    2010 IEEE International Conference on Ultra-Wideband, ICUWB2010 - Proceedings, 2010, 2 : 470 - 473
  • [40] Denial of service attack simulation based-on CASL
    Zhao, Kuo
    Yang, Kexin
    Zhang, Meng
    Wang, Jinling
    Hu, Liang
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 266 - +