IP Address-Based Mitigation Against Denial-of-Service Flooding Attacks

被引:1
|
作者
Patil, Arvind R. Bhagat [1 ]
Thakur, Nileshsingh, V [2 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Nagpur, Maharashtra, India
[2] Nagpur Inst Technol, Nagpur, Maharashtra, India
来源
INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS, ICTIS 2018, VOL 2 | 2019年 / 107卷
关键词
Denial of service; Flood attack; Mitigation; Internet of Things; DDOS ATTACKS; DEFENSE;
D O I
10.1007/978-981-13-1747-7_36
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial-of-service attacks have grown bigger and sophisticated over the years. The alarming number of online services became the targets of DDoS attacks. Emergence of Internet of Things (IOT) has made the situations devastating for the organizations. The flooding attacks are frequently launched by attackers. These attacks consume vital resources of the target resulting into degradation in quality of service and huge financial losses. Hence, it became necessary to design lightweight detection and mitigation approach. In this paper, the presented approach is based on IP address. The IPs are classified as known and unknown based on lists maintained at the target end. The packet filtering decisions are taken based on arrival of known/unknown source IP addresses, volume of incoming requests from these IPs and CPU utilization threshold of the target. The approach mitigates the attack impact for different patterns of attacks. The performance evaluation of the proposed mechanism is done using qualitative and quantitative parameters.
引用
收藏
页码:377 / 389
页数:13
相关论文
共 50 条
  • [1] Mitigation Against Denial-of-Service Flooding and Malformed Packet Attacks
    Patil, Arvind R. Bhagat
    Thakur, Nileshsingh V.
    THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, 2019, 797 : 335 - 342
  • [2] Coping with Denial-of-Service Attacks on the IP Telephony System
    Cadet, Frantz
    Fokum, Daniel T.
    SOUTHEASTCON 2016, 2016,
  • [3] Denial-of-Service Attacks on LoRaWAN
    van Es, Eef
    Vranken, Harald
    Hommersom, Arjen
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [4] Statistical signatures for early detection of flooding denial-of-service attacks
    Haggerty, J
    Shi, Q
    Merabti, M
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 327 - 341
  • [5] Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey
    Rios, Vinicius De Miranda
    Inacio, Pedro R. M.
    Magoni, Damien
    Freire, Mario M.
    IEEE ACCESS, 2022, 10 : 76648 - 76668
  • [6] Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers
    Luo, Hongbin
    Chen, Zhe
    Li, Jiawei
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1801 - 1815
  • [7] CNN-Based Network Intrusion Detection against Denial-of-Service Attacks
    Kim, Jiyeon
    Kim, Jiwon
    Kim, Hyunjung
    Shim, Minsun
    Choi, Eunjung
    ELECTRONICS, 2020, 9 (06) : 1 - 21
  • [8] Securing an Accelerator-Rich System From Flooding-Based Denial-of-Service Attacks
    Sinha, Mitali
    Bhattacharyya, Pramit
    Rout, Sidhartha Sankar
    Prakriya, Neha Bhairavi
    Deb, Sujay
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (02) : 855 - 869
  • [9] Distributed denial-of-service attacks against HTTP/2 services
    Erwin Adi
    Zubair A. Baig
    Philip Hingston
    Chiou-Peng Lam
    Cluster Computing, 2016, 19 : 79 - 86
  • [10] Distributed denial-of-service attacks against HTTP/2 services
    Adi, Erwin
    Baig, Zubair A.
    Hingston, Philip
    Lam, Chiou-Peng
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 79 - 86