Design and analysis of DDoS mitigating network architecture

被引:2
作者
Swati [1 ]
Roy, Sangita [2 ]
Singh, Jawar [1 ]
Mathew, Jimson [3 ]
机构
[1] Indian Inst Technol Patna, Dept Elect Engn, Patna, Bihar, India
[2] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala, Punjab, India
[3] Indian Inst Technol Patna, Dept Comp Sci, Patna, Bihar, India
关键词
Network security; Distributed denial of service; Capability; PUF; PACKET MARKING; INTERNET; SECURITY; THINGS;
D O I
10.1007/s10207-022-00635-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks have emerged as the top security threat with the rise of e-commerce in recent years. Volumetric attacks are the most common DDoS attacks that aim to overwhelm the victim's bandwidth. The current mitigation methods use reactive filtering techniques that are not magical and straightforward solutions. In this paper, we propose a network architecture based on the capability to address the threat of DDoS attacks. Physically Unclonable Functions (PUFs) have emerged as a promising solution in security. Motivated by the capability approach, we put forward a network architecture where the routers use Transient Effect Ring Oscillator PUF to generate and verify capabilities. This novel hardware-based solution, to address the problem, has reduced the computational overhead of capability generation. Additionally, the destination has complete control over the incoming traffic in the proposed architecture, resulting in uninterrupted communication with the legitimate clients regardless of the attacker traffic. The large-scale simulation on an open-source Network Simulator (NS-3) has shown that the proposed architecture efficiently mitigates DDoS attacks to a large extend. With our proposed architecture, the throughput was hardly affected when attacker traffic was varied from 10 to 80%.
引用
收藏
页码:333 / 345
页数:13
相关论文
共 50 条
  • [21] Heuristic detection network - An adaptive DDoS control
    Liu, Lei
    2006 10th International Conference on Communication Technology, Vols 1 and 2, Proceedings, 2006, : 1509 - 1516
  • [22] A heuristic detection network - An adaptive DDoS control
    Liu, Lei
    Fourth International Conference on Intelligent Sensing and Information Processsing, Proceedings, 2006, : 90 - 97
  • [23] NADA: new architecture for detecting DoS and DDoS attacks in fog computing
    Azizpour, Saeed
    Majma, MohammadReza
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (01) : 51 - 64
  • [24] DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation
    De Donno, Michele
    Dragoni, Nicola
    Giaretta, Alberto
    Spognardi, Angelo
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [25] A Time-Efficient Approach Toward DDoS Attack Detection in IoT Network Using SDN
    Bhayo, Jalal
    Jafaq, Riaz
    Ahmed, Awais
    Hameed, Sufian
    Shah, Syed Attique
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3612 - 3630
  • [26] Proactive DDoS detection: integrating packet marking, traffic analysis, and machine learning for enhanced network security
    Pasupathi, Subbulakshmi
    Kumar, Raushan
    Pavithra, L. K.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (03):
  • [27] A Distributed Approach for Detecting and Mitigating DDoS Attacks on White-Boxes
    Armingol Robles, Pablo
    Pastor Perales, Antonio Agustin
    Caja Diaz, Juan Carlos
    2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024, 2024,
  • [28] Exploration of Various Machine Learning Techniques for Identifying and Mitigating DDoS Attacks
    Falowo, Olufunsho I.
    Okpala, Izunna
    Kojo, Emmanuel
    Azumah, Sylvia
    Li, Chengcheng
    2023 20TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PST, 2023, : 133 - 139
  • [29] Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation Architecture
    Otung, Andikan
    Martin, Andrew
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 619 - 630
  • [30] A survey of DDoS attacking techniques and defence mechanisms in the IoT network
    Vishwakarma, Ruchi
    Jain, Ankit Kumar
    TELECOMMUNICATION SYSTEMS, 2020, 73 (01) : 3 - 25