IP Address-Based Mitigation Against Denial-of-Service Flooding Attacks

被引:1
|
作者
Patil, Arvind R. Bhagat [1 ]
Thakur, Nileshsingh, V [2 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Nagpur, Maharashtra, India
[2] Nagpur Inst Technol, Nagpur, Maharashtra, India
来源
INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS, ICTIS 2018, VOL 2 | 2019年 / 107卷
关键词
Denial of service; Flood attack; Mitigation; Internet of Things; DDOS ATTACKS; DEFENSE;
D O I
10.1007/978-981-13-1747-7_36
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial-of-service attacks have grown bigger and sophisticated over the years. The alarming number of online services became the targets of DDoS attacks. Emergence of Internet of Things (IOT) has made the situations devastating for the organizations. The flooding attacks are frequently launched by attackers. These attacks consume vital resources of the target resulting into degradation in quality of service and huge financial losses. Hence, it became necessary to design lightweight detection and mitigation approach. In this paper, the presented approach is based on IP address. The IPs are classified as known and unknown based on lists maintained at the target end. The packet filtering decisions are taken based on arrival of known/unknown source IP addresses, volume of incoming requests from these IPs and CPU utilization threshold of the target. The approach mitigates the attack impact for different patterns of attacks. The performance evaluation of the proposed mechanism is done using qualitative and quantitative parameters.
引用
收藏
页码:377 / 389
页数:13
相关论文
共 50 条
  • [31] DoSGuard: Mitigating Denial-of-Service Attacks in Software-Defined Networks
    Li, Jishuai
    Tu, Tengfei
    Li, Yongsheng
    Qin, Sujuan
    Shi, Yijie
    Wen, Qiaoyan
    SENSORS, 2022, 22 (03)
  • [32] Modified aggressive mode of Internet Key Exchange resistant against Denial-of-Service attacks
    Matsuura, K
    Imai, H
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (05): : 972 - 979
  • [33] SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks
    Chang, Sang-Yoon
    Hu, Yih-Chun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (12) : 3527 - 3540
  • [34] Defense against low-rate TCP-targeted denial-of-service attacks
    Yang, G
    Gerla, M
    Sanadidi, MY
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 345 - 350
  • [35] Detection and Mitigation of Denial of Service Attacks in Internet of Things Networks
    Sanli, Mustafa
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (09) : 12629 - 12639
  • [36] Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
    Bicakci, Kemal
    Tavli, Bulent
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 931 - 941
  • [37] Design and development of proactive solutions for mitigating denial-of-service attacks
    Nagesh, H. R.
    Sekaran, K. Chandra
    2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, : 152 - +
  • [38] Measuring the Impact of Denial-of-Service Attacks on Wireless Sensor Networks
    Riecker, Michael
    Thies, Daniel
    Hollick, Matthias
    2014 IEEE 39TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2014, : 296 - 304
  • [39] Stability analysis of networked control systems with denial-of-service attacks
    Zhang, Jin
    Peng, Chen
    Masroor, Suhaib
    Sun, Hongtao
    Chai, Lin
    2016 UKACC 11TH INTERNATIONAL CONFERENCE ON CONTROL (CONTROL), 2016,
  • [40] Application Layer Denial-of-Service Attacks and Defense Mechanisms: A Survey
    Tripathi, Nikhil
    Hubballi, Neminath
    ACM COMPUTING SURVEYS, 2021, 54 (04)