Abstract
From the last few years, routing infrastructure attacks like Distributed Denial of Service Attack (DDoS) and Denial of Service (DoS) Attack have been the most trending topic in the domain of Network security. And these days most of the people prefer online payment, online shopping, online class etc. So the attackers tries to flood the router during this time. And We are focusing on Distributed Denial of Service Attack. In this paper, it implement a method to detect (DDoS) Distributed Denial of Service Attack in router by using Ns3 simulator. For this simulation we used unbalanced dumbbell topology. And the process of imposing attack scenario in dumbbell topology is defined in section VI. This simulated DDoS attacks are presented in graph by using the proposed algorithm to detect the routing infrastructure attack in the network.
Supported by organization x.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Gavaskar, S., Surendiran, R., Ramaraj, E.: Three counter defense mechanism for TCP SYN flooding attacks. Int. J. Comput. Appl. 6(6), 0975–8887 (2010)
Prathap, A., Sailaja, R.: Detection and Prevention of Denial of Service Attacks Using Distributed Denial-of-Service Detection Mechanism
KrishnaKumar, B., Krishna Kumar, P., Sukanesh, R.: Hop count-based packet processing approach to counter DDoS attacks. In: 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC). IEEE (2010)
Shevtekar, A., Anantharam, K., Ansari, N.: Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett. 9(4), 363–365 (2005)
Kumarasamy, S., Gowrishankar, A.: An active defense mechanism for TCP SYN flooding attacks. arXiv preprint arXiv:1201.2103 (2012)
Sharma, S., Sahu, S.K., Jena, S.K.: On selection of attributes for entropy-based detection of DDoS. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE (2015)
Singh, J., Sachdeva, M., Kumar, K.: Detection of DDOS attacks using source IP based entropy. Int. J. Comput. Sci. Eng. Inf. Technol. Res. (IJCSEITR) 3, 2249–6831 (2013)
Bhandari, A., Sangal, A.L., Kumar, K.: Destination address entropy based detection and traceback approach against distributed denial of service attacks. Int. J. Comput. Netw. Inf. Secur. 7(8), 9 (2015)
Zhang, J., et al.: An advanced entropy-based DDOS detection scheme. In: 2010 International Conference on Information Networking and Automation (ICINA), vol. 2. IEEE (2010)
Navaz, A.S., Sangeetha, V., Prabhadevi, C.: Entropy based anomaly detection system to prevent DDoS attacks in cloud. arXiv preprint arXiv:1308.6745 (2013)
Jun, J.-H., Oh, H., Kim, S.-H.: DDoS flooding attack detection through a step-by-step investigation. In: Networked Embedded Systems for Enterprise Applications (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chanu, A.D., Sharma, B. (2020). Detection of Routing Infrastructure Attack in TCP Connection. In: Saha, A., Kar, N., Deb, S. (eds) Advances in Computational Intelligence, Security and Internet of Things. ICCISIoT 2019. Communications in Computer and Information Science, vol 1192. Springer, Singapore. https://doi.org/10.1007/978-981-15-3666-3_11
Download citation
DOI: https://doi.org/10.1007/978-981-15-3666-3_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3665-6
Online ISBN: 978-981-15-3666-3
eBook Packages: Computer ScienceComputer Science (R0)