Design and analysis of DDoS mitigating network architecture

被引:2
作者
Swati [1 ]
Roy, Sangita [2 ]
Singh, Jawar [1 ]
Mathew, Jimson [3 ]
机构
[1] Indian Inst Technol Patna, Dept Elect Engn, Patna, Bihar, India
[2] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala, Punjab, India
[3] Indian Inst Technol Patna, Dept Comp Sci, Patna, Bihar, India
关键词
Network security; Distributed denial of service; Capability; PUF; PACKET MARKING; INTERNET; SECURITY; THINGS;
D O I
10.1007/s10207-022-00635-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks have emerged as the top security threat with the rise of e-commerce in recent years. Volumetric attacks are the most common DDoS attacks that aim to overwhelm the victim's bandwidth. The current mitigation methods use reactive filtering techniques that are not magical and straightforward solutions. In this paper, we propose a network architecture based on the capability to address the threat of DDoS attacks. Physically Unclonable Functions (PUFs) have emerged as a promising solution in security. Motivated by the capability approach, we put forward a network architecture where the routers use Transient Effect Ring Oscillator PUF to generate and verify capabilities. This novel hardware-based solution, to address the problem, has reduced the computational overhead of capability generation. Additionally, the destination has complete control over the incoming traffic in the proposed architecture, resulting in uninterrupted communication with the legitimate clients regardless of the attacker traffic. The large-scale simulation on an open-source Network Simulator (NS-3) has shown that the proposed architecture efficiently mitigates DDoS attacks to a large extend. With our proposed architecture, the throughput was hardly affected when attacker traffic was varied from 10 to 80%.
引用
收藏
页码:333 / 345
页数:13
相关论文
共 50 条
  • [31] Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance
    Hu, Yaodan
    Li, Xuanheng
    Liu, Jianqing
    Ding, Haichuan
    Gong, Yanmin
    Fang, Yuguang
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [32] Reconfigurable architecture for network flow analysis
    Yusuf, S.
    Luk, W.
    Sloman, M.
    Dulay, N.
    Lupu, E. C.
    Brown, G.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2008, 16 (01) : 57 - 65
  • [33] Mitigating DDoS Attacks in SDN-Based IoT Networks Leveraging Secure Control and Data Plane Algorithm
    Wang, Song
    Gomez, Karina
    Sithamparanathan, Kandeepan
    Asghar, Muhammad Rizwan
    Russello, Giovanni
    Zanna, Paul
    APPLIED SCIENCES-BASEL, 2021, 11 (03): : 1 - 27
  • [34] A Cost Optimized Solution for Defending Against DDoS Attacks: An Analysis of a Multi-layered Architecture
    Gaylah K.D.
    Vaghela R.S.
    Zongo W.-B.S.
    SN Computer Science, 4 (5)
  • [35] PoAh-Enabled Federated Learning Architecture for DDoS Attack Detection in IoT Networks
    Park, Jin Ho
    Yotxay, Sangthong
    Singh, Sushil Kumar
    Park, Jong Hyuk
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2024, 14 : 1 - 24
  • [36] Design and implementation of service-based network architecture
    Yi, Fa-Sheng
    Chen, Gui-Hai
    Liu, Ming
    Gong, Hai-Gang
    Zeng, Jia-Zhi
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (12): : 3179 - 3195
  • [37] Analysis and Design of Tamper-Mitigating Microfluidic Routing Fabrics
    Tang, Jack
    Ibrahim, Mohamed
    Chakrabarty, Krishnendu
    Karri, Ramesh
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (05) : 1003 - 1016
  • [38] Exercise and Diet Architecture Design based on Blockchain Network
    Fu, Meng-Hsuan
    2018 9TH INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP 2018), 2018, : 12 - 15
  • [39] Detecting distributed denial of service (DDoS) in SD-IoT environment with enhanced firefly algorithm and convolution neural network
    Sivanesan, N.
    Archana, K. S.
    OPTICAL AND QUANTUM ELECTRONICS, 2023, 55 (05)
  • [40] Analysis of anomalous behaviour in network systems using deep reinforcement learning with convolutional neural network architecture
    Modirrousta, Mohammad Hossein
    Forghani Arani, Parisa
    Kazemi, Reza
    Aliyari-Shoorehdeli, Mahdi
    CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2024, 9 (06) : 1467 - 1484