Abstract
Security is one of the critical attributes of any communication network. Various attacks have been reported over the last years but mainly denial of service effects entire network in a drastic way. So many mechanisms are developed but they are lagging in aspects like identifying IP spoofing (by session hijacking) and attack source. Existed Mechanisms identifies the attack after it’s effect is being experienced by the victim. So we propose a new mechanism that is implemented on a router to identify the attack by monitoring the traffic flow, for that router uses a routing table with newly proposing attributes, i.e., timer, MAC address, and packet count. By using MAC address, there is possibility of finding actual attacker.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alomari,E., Manickam, S., Gupta, B.B., Karuppayah, S., Alfaris, R.: Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. Int. J. Comput. Appl. 49(7), 0975–8887 (2012)
AL-Musawi, B.Q.M.: Mitigating DoS/DDoS attacks using iptables. Int. J. Eng. Technol. IJET-IJENS 12(03) (2012)
François, J., Aib, I., Boutaba R.: FireCol: a collaborative protection network for the detection of flooding DDoS attacks. IEEE 2012 Transaction on Networking, vol. 99
Saritha, M., Chinta M.: Countering varying dos attacks using snort rules, Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(10) (2013)
Buvaneswari, M., Subha, T.: Ihoneycol: a collaborative technique for mitigation of DDoS attack. Int. J. Emerg. Technol. Adv. Eng. 3(1) (2013)
Deepthi, S., Prashanti, G., Sandhya, R.K.: Blocking of flooding attacks: using active internet traffic filtering mechanism. Int. J. Eng. Trends Technol. 4(7) (2013)
Mahajan, D., Sachdeva M.: DDoS attack prevention and mitigation techniques–a review. Int. J. Comput. Appl. 67(19), 0975–8887 (2013)
Garg, U., Verma, P., Moudgil, Y.S. Sharma, S.: MAC and logical addressing (A Review Study). Int. J. Eng. Res. Appl. (IJERA)
Naik, R.B., Shefali, R.R.: Low-area low-power and high-speed TCAMS. In: International Conference on VLSI, Communication and Instrumentation (ICVCI) 2011. Proceedings published by International Journal of Computer Applications (IJCA)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Deepthi, S., Hemanth, K.S.S., Rajesh, D., Kalyani, M. (2015). A Novel Approach for DDoS Mitigation with Router. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 308. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2012-1_75
Download citation
DOI: https://doi.org/10.1007/978-81-322-2012-1_75
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2011-4
Online ISBN: 978-81-322-2012-1
eBook Packages: EngineeringEngineering (R0)