Abstract
In latest existence, Path identifiers (PID) have utilised as inter-domain routing (IDR) things in association. Though, the PIDs utilised in present methods are immobile that creates it simple for attacker to introduce D DoS flooding attacks. To discourse this problem, current a D-PID structure, which make use of PIDs negotiated among neighbouring domains as IDR substance. The PID of the inter-domain connection between two domains in DPID is going to be kept private and can vary periodically. Cryptographic techniques may be employed as well to safeguard the security of information shared over a network. There is a good possibility that DPID’s data-secure technique will stop networking D DoS assaults.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Godfrey PB, Ganichev I, Shenker S, Stoica I (2009) Pathlet routing. In: Proceedings of SIGCOMM’09, Aug 2009
Jokela P, Zahemszky A, Esteve Rothenberg C, Arianfar S, Nikander P (2009) LIPSIN: line speed publish/subscribe inter- networking. In: Proceedings of SIGCOMM’09, Aug. 2009
Koponen T, Chawla M, Chun BG, Ermolinskiy A, Kim KH, Shenker S, Stoica I (2007) A data-oriented (and beyond) network architecture. In: Proceedings of SIGCOMM’07, Aug. 2007
Luo H, Chen Z, Cui J, Zhang H, Zukerman M, Qiao C (2014) CoLoR: an information Centric internet architecture for innovations. IEEE Network
Luo H, Chen Z, Li J, Vasilakos AV (2017) Preventing distributed denial-of-service flooding attacks with dynamic path identifiers. IEEE Trans Inf Forensics Secur 2017
Liu X, Yang X, Lu Y (2008) To filter or to authorize: network-layer DoS defenseagainst multimillion-node botnets. In: Proceedings on SIGCOMM’ 08, Aug. 2008
S. T. Zargar, J. Joshi, D. Tipper “A Survey of Defense Mechanisms Against system Distributed Denial of Service (DDoS) Flooding Attacks,” IEEE Commun.Surv&Tut. Nov. 2013
Ferguson P, Senie D (2000) Network ingress filtering: defeating denial of service of attacks that employ IP source address spoofing. IETF Internet RFC 2827, May 2000
Park K, Lee H (2001) On the effectiveness of route-based packet filtering for the distributed DoS attack prevention in powerlaw internets, Aug. 2001
A. Yaar, A. Perrig, D. Song, “StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense,” IEEE J. on Sel. Areas in Commun., Oct. 2006
Wang H, Jin C, Shin KG (2007) Defense against spoofed IP traffic using hop-count filtering, IEEE/ACM Trans Netw 2007
Duan Z, Yuan X, Chandrashekar J (2008) Controlling IP spoofing through inter domain packet filters. IEEE Trans Depend Secure Comput 2008
Savage S, Wetherall D, Karlin A, Anderson T (2000) Practical network support for IP traceback. In: Proceedings on Aug. 2000, Stockholm, Sweden
Han S-J (1996) The improved data encryption standard (DES) algorithm. IEEE
Beamer S, Patterson D (2012) Direction-optimizing breadth-first search. In: IEEE conference
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lakshmi, S.G., Durga, T.N.V., Srilatha, P., Kumari, C.H.D.V.P., Laxmi Lydia, E., Akhmetshin, E. (2024). Assessment of a Semi-supervised Machine Learning Method for Thwarting Network DDoS Assaults. In: Bhateja, V., Chowdary, P.S.R., Flores-Fuentes, W., Urooj, S., Sankar Dhar, R. (eds) Evolution in Signal Processing and Telecommunication Networks. ICMEET 2023. Lecture Notes in Electrical Engineering, vol 1155. Springer, Singapore. https://doi.org/10.1007/978-981-97-0644-0_28
Download citation
DOI: https://doi.org/10.1007/978-981-97-0644-0_28
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0643-3
Online ISBN: 978-981-97-0644-0
eBook Packages: EngineeringEngineering (R0)