Skip to main content

Detection of Routing Infrastructure Attack in TCP Connection

  • Conference paper
  • First Online:
  • 707 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1192))

Abstract

From the last few years, routing infrastructure attacks like Distributed Denial of Service Attack (DDoS) and Denial of Service (DoS) Attack have been the most trending topic in the domain of Network security. And these days most of the people prefer online payment, online shopping, online class etc. So the attackers tries to flood the router during this time. And We are focusing on Distributed Denial of Service Attack. In this paper, it implement a method to detect (DDoS) Distributed Denial of Service Attack in router by using Ns3 simulator. For this simulation we used unbalanced dumbbell topology. And the process of imposing attack scenario in dumbbell topology is defined in section VI. This simulated DDoS attacks are presented in graph by using the proposed algorithm to detect the routing infrastructure attack in the network.

Supported by organization x.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Gavaskar, S., Surendiran, R., Ramaraj, E.: Three counter defense mechanism for TCP SYN flooding attacks. Int. J. Comput. Appl. 6(6), 0975–8887 (2010)

    Google Scholar 

  2. Prathap, A., Sailaja, R.: Detection and Prevention of Denial of Service Attacks Using Distributed Denial-of-Service Detection Mechanism

    Google Scholar 

  3. KrishnaKumar, B., Krishna Kumar, P., Sukanesh, R.: Hop count-based packet processing approach to counter DDoS attacks. In: 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC). IEEE (2010)

    Google Scholar 

  4. Shevtekar, A., Anantharam, K., Ansari, N.: Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett. 9(4), 363–365 (2005)

    Article  Google Scholar 

  5. Kumarasamy, S., Gowrishankar, A.: An active defense mechanism for TCP SYN flooding attacks. arXiv preprint arXiv:1201.2103 (2012)

  6. Sharma, S., Sahu, S.K., Jena, S.K.: On selection of attributes for entropy-based detection of DDoS. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE (2015)

    Google Scholar 

  7. Singh, J., Sachdeva, M., Kumar, K.: Detection of DDOS attacks using source IP based entropy. Int. J. Comput. Sci. Eng. Inf. Technol. Res. (IJCSEITR) 3, 2249–6831 (2013)

    Google Scholar 

  8. Bhandari, A., Sangal, A.L., Kumar, K.: Destination address entropy based detection and traceback approach against distributed denial of service attacks. Int. J. Comput. Netw. Inf. Secur. 7(8), 9 (2015)

    Google Scholar 

  9. Zhang, J., et al.: An advanced entropy-based DDOS detection scheme. In: 2010 International Conference on Information Networking and Automation (ICINA), vol. 2. IEEE (2010)

    Google Scholar 

  10. https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/Baseline_Security/securebasebook/sec_chap3.html

  11. Navaz, A.S., Sangeetha, V., Prabhadevi, C.: Entropy based anomaly detection system to prevent DDoS attacks in cloud. arXiv preprint arXiv:1308.6745 (2013)

  12. Jun, J.-H., Oh, H., Kim, S.-H.: DDoS flooding attack detection through a step-by-step investigation. In: Networked Embedded Systems for Enterprise Applications (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Asem Debala Chanu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chanu, A.D., Sharma, B. (2020). Detection of Routing Infrastructure Attack in TCP Connection. In: Saha, A., Kar, N., Deb, S. (eds) Advances in Computational Intelligence, Security and Internet of Things. ICCISIoT 2019. Communications in Computer and Information Science, vol 1192. Springer, Singapore. https://doi.org/10.1007/978-981-15-3666-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-3666-3_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-3665-6

  • Online ISBN: 978-981-15-3666-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics