Mitigation Against Denial-of-Service Flooding and Malformed Packet Attacks

被引:3
|
作者
Patil, Arvind R. Bhagat [1 ]
Thakur, Nileshsingh V. [2 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Nagpur, Maharashtra, India
[2] Nagpur Inst Technol, Nagpur, Maharashtra, India
来源
THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY | 2019年 / 797卷
关键词
Denial of service; Flood attack; Malformed packets; Mitigation; DEFENSE;
D O I
10.1007/978-981-13-1165-9_30
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial-of-service attack is really a concern and challenging task to deal with due to the extensive use of advanced technologies by attackers. The denial-of-service flood attacks can consume the network resource such as available bandwidth, CPU, memory, thus affecting the normal functioning of the working network. The arrival of unknown source IP addresses, volume of incoming requests from these IP's and malformed packets invalid flag settings and other invalid packet conditions are the key parameters for filtering decision. In this paper, these features are explored to mitigate DoS attacks effectively. The performance evaluation of the proposed mechanism is done using qualitative and quantitative parameters.
引用
收藏
页码:335 / 342
页数:8
相关论文
共 50 条
  • [21] Modified aggressive mode of Internet Key Exchange resistant against Denial-of-Service attacks
    Matsuura, K
    Imai, H
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (05): : 972 - 979
  • [22] SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks
    Chang, Sang-Yoon
    Hu, Yih-Chun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (12) : 3527 - 3540
  • [23] Defense against low-rate TCP-targeted denial-of-service attacks
    Yang, G
    Gerla, M
    Sanadidi, MY
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 345 - 350
  • [24] Protection Against Denial of Service Attacks: A Survey
    Loukas, Georgios
    Oke, Gulay
    COMPUTER JOURNAL, 2010, 53 (07) : 1020 - 1037
  • [25] Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
    Tan, Zhiyuan
    Jamdagni, Aruna
    He, Xiangjian
    Nanda, Priyadarsi
    Liu, Ren Ping
    Hu, Jiankun
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) : 2519 - 2533
  • [26] Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
    Bicakci, Kemal
    Tavli, Bulent
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 931 - 941
  • [27] Design and development of proactive solutions for mitigating denial-of-service attacks
    Nagesh, H. R.
    Sekaran, K. Chandra
    2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, : 152 - +
  • [28] Measuring the Impact of Denial-of-Service Attacks on Wireless Sensor Networks
    Riecker, Michael
    Thies, Daniel
    Hollick, Matthias
    2014 IEEE 39TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2014, : 296 - 304
  • [29] Stability analysis of networked control systems with denial-of-service attacks
    Zhang, Jin
    Peng, Chen
    Masroor, Suhaib
    Sun, Hongtao
    Chai, Lin
    2016 UKACC 11TH INTERNATIONAL CONFERENCE ON CONTROL (CONTROL), 2016,
  • [30] Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks
    Zuba, Michael
    Shi, Zhijie
    Peng, Zheng
    Cui, Jun-Hong
    Zhou, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2635 - 2645