Design and analysis of DDoS mitigating network architecture

被引:2
作者
Swati [1 ]
Roy, Sangita [2 ]
Singh, Jawar [1 ]
Mathew, Jimson [3 ]
机构
[1] Indian Inst Technol Patna, Dept Elect Engn, Patna, Bihar, India
[2] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala, Punjab, India
[3] Indian Inst Technol Patna, Dept Comp Sci, Patna, Bihar, India
关键词
Network security; Distributed denial of service; Capability; PUF; PACKET MARKING; INTERNET; SECURITY; THINGS;
D O I
10.1007/s10207-022-00635-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks have emerged as the top security threat with the rise of e-commerce in recent years. Volumetric attacks are the most common DDoS attacks that aim to overwhelm the victim's bandwidth. The current mitigation methods use reactive filtering techniques that are not magical and straightforward solutions. In this paper, we propose a network architecture based on the capability to address the threat of DDoS attacks. Physically Unclonable Functions (PUFs) have emerged as a promising solution in security. Motivated by the capability approach, we put forward a network architecture where the routers use Transient Effect Ring Oscillator PUF to generate and verify capabilities. This novel hardware-based solution, to address the problem, has reduced the computational overhead of capability generation. Additionally, the destination has complete control over the incoming traffic in the proposed architecture, resulting in uninterrupted communication with the legitimate clients regardless of the attacker traffic. The large-scale simulation on an open-source Network Simulator (NS-3) has shown that the proposed architecture efficiently mitigates DDoS attacks to a large extend. With our proposed architecture, the throughput was hardly affected when attacker traffic was varied from 10 to 80%.
引用
收藏
页码:333 / 345
页数:13
相关论文
共 50 条
  • [1] Design and analysis of DDoS mitigating network architecture
    Sangita Swati
    Jawar Roy
    Jimson Singh
    International Journal of Information Security, 2023, 22 : 333 - 345
  • [2] A Framework for Mitigating DDoS and DOS Attacks in IoT Environment Using Hybrid Approach
    Ghali, Abdulrahman Aminu
    Ahmad, Rohiza
    Alhussian, Hitham
    ELECTRONICS, 2021, 10 (11)
  • [3] Hybrid architecture for mitigating DDoS and other intrusions in SDN-IoT using MHDBN-W deep learning model
    Revathi, M.
    Devi, S. Kiruthika
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2024,
  • [4] Bringing Intelligence to Software Defined Networks: Mitigating DDoS Attacks
    Houda, Zakaria Abou El
    Khoukhi, Lyes
    Hafid, Abdelhakim Senhaji
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (04): : 2523 - 2535
  • [5] Ensemble Deep Learning Models for Mitigating DDoS Attack in Software-Defined Network
    Alanazi, Fatmah
    Jambi, Kamal
    Eassa, Fathy
    Khemakhem, Maher
    Basuhail, Abdullah
    Alsubhi, Khalid
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 33 (02) : 923 - 938
  • [6] An Adaptive Control Mechanism for Mitigating DDoS Attacks
    Wu, Qingtao
    Zheng, Ruijuan
    Pu, Jiexin
    Sun, Shibao
    2009 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND LOGISTICS ( ICAL 2009), VOLS 1-3, 2009, : 1760 - 1764
  • [7] Autonomous Dynamic Honeypot Routing Mechanism for Mitigating DDoS Attacks in DMZ
    Sardana, Anjali
    Joshi, R. C.
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 356 - 362
  • [8] A comprehensive study of DDoS attacks over IoT network and their countermeasures
    Kumari, Pooja
    Jain, Ankit Kumar
    COMPUTERS & SECURITY, 2023, 127
  • [9] DDoS: Design, implementation and analysis of automated model
    Tupakula, Udaya Kiran
    Varadharajan, Vijay
    Gajam, Ashok Kumar
    Vuppala, Sunil Kumar
    Rao, Pandalaneni Naga Srinivasa
    International Journal of Wireless and Mobile Computing, 2007, 2 (01) : 72 - 85
  • [10] Analysis of SCADA System Vulnerabilities to DDoS Attacks
    Markovic-Petrovic, Jasna D.
    Stojanovic, Mirjana D.
    2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 591 - 594