Advertisement

Detection of Routing Infrastructure Attack in TCP Connection

  • Asem Debala ChanuEmail author
  • Bobby Sharma
Conference paper
  • 78 Downloads
Part of the Communications in Computer and Information Science book series (CCIS, volume 1192)

Abstract

From the last few years, routing infrastructure attacks like Distributed Denial of Service Attack (DDoS) and Denial of Service (DoS) Attack have been the most trending topic in the domain of Network security. And these days most of the people prefer online payment, online shopping, online class etc. So the attackers tries to flood the router during this time. And We are focusing on Distributed Denial of Service Attack. In this paper, it implement a method to detect (DDoS) Distributed Denial of Service Attack in router by using Ns3 simulator. For this simulation we used unbalanced dumbbell topology. And the process of imposing attack scenario in dumbbell topology is defined in section VI. This simulated DDoS attacks are presented in graph by using the proposed algorithm to detect the routing infrastructure attack in the network.

Keywords

DDoS Routing infrastructure attack Ns3 

References

  1. 1.
    Gavaskar, S., Surendiran, R., Ramaraj, E.: Three counter defense mechanism for TCP SYN flooding attacks. Int. J. Comput. Appl. 6(6), 0975–8887 (2010)Google Scholar
  2. 2.
    Prathap, A., Sailaja, R.: Detection and Prevention of Denial of Service Attacks Using Distributed Denial-of-Service Detection MechanismGoogle Scholar
  3. 3.
    KrishnaKumar, B., Krishna Kumar, P., Sukanesh, R.: Hop count-based packet processing approach to counter DDoS attacks. In: 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC). IEEE (2010)Google Scholar
  4. 4.
    Shevtekar, A., Anantharam, K., Ansari, N.: Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett. 9(4), 363–365 (2005)CrossRefGoogle Scholar
  5. 5.
    Kumarasamy, S., Gowrishankar, A.: An active defense mechanism for TCP SYN flooding attacks. arXiv preprint arXiv:1201.2103 (2012)
  6. 6.
    Sharma, S., Sahu, S.K., Jena, S.K.: On selection of attributes for entropy-based detection of DDoS. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE (2015)Google Scholar
  7. 7.
    Singh, J., Sachdeva, M., Kumar, K.: Detection of DDOS attacks using source IP based entropy. Int. J. Comput. Sci. Eng. Inf. Technol. Res. (IJCSEITR) 3, 2249–6831 (2013)Google Scholar
  8. 8.
    Bhandari, A., Sangal, A.L., Kumar, K.: Destination address entropy based detection and traceback approach against distributed denial of service attacks. Int. J. Comput. Netw. Inf. Secur. 7(8), 9 (2015)Google Scholar
  9. 9.
    Zhang, J., et al.: An advanced entropy-based DDOS detection scheme. In: 2010 International Conference on Information Networking and Automation (ICINA), vol. 2. IEEE (2010)Google Scholar
  10. 10.
  11. 11.
    Navaz, A.S., Sangeetha, V., Prabhadevi, C.: Entropy based anomaly detection system to prevent DDoS attacks in cloud. arXiv preprint arXiv:1308.6745 (2013)
  12. 12.
    Jun, J.-H., Oh, H., Kim, S.-H.: DDoS flooding attack detection through a step-by-step investigation. In: Networked Embedded Systems for Enterprise Applications (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer Science and Engineering, School of TechnologyAssam Don Bosco UniversityGuwahatiIndia

Personalised recommendations