Mitigation Against Denial-of-Service Flooding and Malformed Packet Attacks

被引:3
|
作者
Patil, Arvind R. Bhagat [1 ]
Thakur, Nileshsingh V. [2 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Nagpur, Maharashtra, India
[2] Nagpur Inst Technol, Nagpur, Maharashtra, India
来源
THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY | 2019年 / 797卷
关键词
Denial of service; Flood attack; Malformed packets; Mitigation; DEFENSE;
D O I
10.1007/978-981-13-1165-9_30
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial-of-service attack is really a concern and challenging task to deal with due to the extensive use of advanced technologies by attackers. The denial-of-service flood attacks can consume the network resource such as available bandwidth, CPU, memory, thus affecting the normal functioning of the working network. The arrival of unknown source IP addresses, volume of incoming requests from these IP's and malformed packets invalid flag settings and other invalid packet conditions are the key parameters for filtering decision. In this paper, these features are explored to mitigate DoS attacks effectively. The performance evaluation of the proposed mechanism is done using qualitative and quantitative parameters.
引用
收藏
页码:335 / 342
页数:8
相关论文
共 50 条
  • [11] Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques
    Ul Islam, Mohammad Nafis
    Fahmin, Ahmed
    Hossain, Md Shohrab
    Atiquzzaman, Mohammed
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1993 - 2021
  • [12] Estimates of success rates of Denial-of-Service attacks
    Sommestad, Teodor
    Holm, Hannes
    Ekstedt, Mathias
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 21 - 28
  • [13] Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques
    Mohammad Nafis Ul Islam
    Ahmed Fahmin
    Md. Shohrab Hossain
    Mohammed Atiquzzaman
    Wireless Personal Communications, 2021, 116 : 1993 - 2021
  • [14] Securing an Accelerator-Rich System From Flooding-Based Denial-of-Service Attacks
    Sinha, Mitali
    Bhattacharyya, Pramit
    Rout, Sidhartha Sankar
    Prakriya, Neha Bhairavi
    Deb, Sujay
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (02) : 855 - 869
  • [15] CNN-Based Network Intrusion Detection against Denial-of-Service Attacks
    Kim, Jiyeon
    Kim, Jiwon
    Kim, Hyunjung
    Shim, Minsun
    Choi, Eunjung
    ELECTRONICS, 2020, 9 (06) : 1 - 21
  • [16] APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks
    Seo, Dongwon
    Lee, Heejo
    Perrig, Adrian
    COMPUTERS & SECURITY, 2013, 39 : 366 - 385
  • [17] Denial of Service Attacks Mitigation in the Cloud
    Alosaimi, Wael
    Zak, Michal
    Al-Begain, Khalid
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 47 - 53
  • [18] Toward a Distributed Approach for Detection and Mitigation of Denial-of-Service Attacks Within Industrial Internet of Things
    Borgiani, Vladimir
    Moratori, Patrick
    Kazienko, Juliano F.
    Tubino, Emilio R. R.
    Quincozes, Silvio E.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4569 - 4578
  • [19] Coping with Denial-of-Service Attacks on the IP Telephony System
    Cadet, Frantz
    Fokum, Daniel T.
    SOUTHEASTCON 2016, 2016,
  • [20] A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid
    Huseinovic, Alvin
    Mrdovic, Sasa
    Bicakci, Kemal
    Uludag, Suleyman
    IEEE ACCESS, 2020, 8 : 177447 - 177470