A Novel Approach for DDoS Mitigation with Router

  • S. Deepthi
  • K. S. S. Hemanth
  • Duvvuru Rajesh
  • M. Kalyani
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 308)

Abstract

Security is one of the critical attributes of any communication network. Various attacks have been reported over the last years but mainly denial of service effects entire network in a drastic way. So many mechanisms are developed but they are lagging in aspects like identifying IP spoofing (by session hijacking) and attack source. Existed Mechanisms identifies the attack after it’s effect is being experienced by the victim. So we propose a new mechanism that is implemented on a router to identify the attack by monitoring the traffic flow, for that router uses a routing table with newly proposing attributes, i.e., timer, MAC address, and packet count. By using MAC address, there is possibility of finding actual attacker.

Keywords

DDoS Mitigation Routing table MAC address 

References

  1. 1.
    Alomari,E., Manickam, S., Gupta, B.B., Karuppayah, S., Alfaris, R.: Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. Int. J. Comput. Appl. 49(7), 0975–8887 (2012)Google Scholar
  2. 2.
    AL-Musawi, B.Q.M.: Mitigating DoS/DDoS attacks using iptables. Int. J. Eng. Technol. IJET-IJENS 12(03) (2012)Google Scholar
  3. 3.
    François, J., Aib, I., Boutaba R.: FireCol: a collaborative protection network for the detection of flooding DDoS attacks. IEEE 2012 Transaction on Networking, vol. 99Google Scholar
  4. 4.
    Saritha, M., Chinta M.: Countering varying dos attacks using snort rules, Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(10) (2013)Google Scholar
  5. 5.
    Buvaneswari, M., Subha, T.: Ihoneycol: a collaborative technique for mitigation of DDoS attack. Int. J. Emerg. Technol. Adv. Eng. 3(1) (2013)Google Scholar
  6. 6.
    Deepthi, S., Prashanti, G., Sandhya, R.K.: Blocking of flooding attacks: using active internet traffic filtering mechanism. Int. J. Eng. Trends Technol. 4(7) (2013)Google Scholar
  7. 7.
    Mahajan, D., Sachdeva M.: DDoS attack prevention and mitigation techniques–a review. Int. J. Comput. Appl. 67(19), 0975–8887 (2013)Google Scholar
  8. 8.
  9. 9.
    Garg, U., Verma, P., Moudgil, Y.S. Sharma, S.: MAC and logical addressing (A Review Study). Int. J. Eng. Res. Appl. (IJERA)Google Scholar
  10. 10.
    Naik, R.B., Shefali, R.R.: Low-area low-power and high-speed TCAMS. In: International Conference on VLSI, Communication and Instrumentation (ICVCI) 2011. Proceedings published by International Journal of Computer Applications (IJCA)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • S. Deepthi
    • 1
  • K. S. S. Hemanth
    • 1
  • Duvvuru Rajesh
    • 2
  • M. Kalyani
    • 1
  1. 1.Department of Computer Science and EngineeringVignan’s Lara Institute of TechnologyGunturIndia
  2. 2.Department of Computer Science and EngineeringNational Institute of Technology JamshedpurJamshedpurIndia

Personalised recommendations