Skip to main content

A Novel Approach for DDoS Mitigation with Router

  • Conference paper
  • First Online:
Intelligent Computing, Communication and Devices

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 308))

  • 2596 Accesses

Abstract

Security is one of the critical attributes of any communication network. Various attacks have been reported over the last years but mainly denial of service effects entire network in a drastic way. So many mechanisms are developed but they are lagging in aspects like identifying IP spoofing (by session hijacking) and attack source. Existed Mechanisms identifies the attack after it’s effect is being experienced by the victim. So we propose a new mechanism that is implemented on a router to identify the attack by monitoring the traffic flow, for that router uses a routing table with newly proposing attributes, i.e., timer, MAC address, and packet count. By using MAC address, there is possibility of finding actual attacker.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alomari,E., Manickam, S., Gupta, B.B., Karuppayah, S., Alfaris, R.: Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. Int. J. Comput. Appl. 49(7), 0975–8887 (2012)

    Google Scholar 

  2. AL-Musawi, B.Q.M.: Mitigating DoS/DDoS attacks using iptables. Int. J. Eng. Technol. IJET-IJENS 12(03) (2012)

    Google Scholar 

  3. François, J., Aib, I., Boutaba R.: FireCol: a collaborative protection network for the detection of flooding DDoS attacks. IEEE 2012 Transaction on Networking, vol. 99

    Google Scholar 

  4. Saritha, M., Chinta M.: Countering varying dos attacks using snort rules, Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(10) (2013)

    Google Scholar 

  5. Buvaneswari, M., Subha, T.: Ihoneycol: a collaborative technique for mitigation of DDoS attack. Int. J. Emerg. Technol. Adv. Eng. 3(1) (2013)

    Google Scholar 

  6. Deepthi, S., Prashanti, G., Sandhya, R.K.: Blocking of flooding attacks: using active internet traffic filtering mechanism. Int. J. Eng. Trends Technol. 4(7) (2013)

    Google Scholar 

  7. Mahajan, D., Sachdeva M.: DDoS attack prevention and mitigation techniques–a review. Int. J. Comput. Appl. 67(19), 0975–8887 (2013)

    Google Scholar 

  8. http://en.wikipedia.org/wiki/Routing_table

  9. Garg, U., Verma, P., Moudgil, Y.S. Sharma, S.: MAC and logical addressing (A Review Study). Int. J. Eng. Res. Appl. (IJERA)

    Google Scholar 

  10. Naik, R.B., Shefali, R.R.: Low-area low-power and high-speed TCAMS. In: International Conference on VLSI, Communication and Instrumentation (ICVCI) 2011. Proceedings published by International Journal of Computer Applications (IJCA)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Deepthi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Deepthi, S., Hemanth, K.S.S., Rajesh, D., Kalyani, M. (2015). A Novel Approach for DDoS Mitigation with Router. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 308. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2012-1_75

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2012-1_75

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2011-4

  • Online ISBN: 978-81-322-2012-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics