Analysis on DDoS Attack using a Probabilistic Approach

Authors(2) :-Dr. B. Mukunthan, S. Dhayananthi

In the concepts of DDoS attackers, the researchers have taken two approaches. The first approach improves the routing infrastructures whereas the second approach protects Internet servers with sophisticated resource manage-ment to the servers. This end system approach provides more accurate resource accounting, and fine-grained service isolation and differentiation for example, to shield interactive video traffic from FTP traffic. However, without a mechanism to detect spoofed traffic, spoofed packets will share the same resource principals and code paths as legitimate requests. While a resource manager can confine the scope of damage to the particular service under attack, it cannot sustain the availability of that service. In stark contrast, the server's ability to filter most, if not all, spoofed IP packets can help sustain service availability even under DDoS attacks. Since filtering spoofed IP packets is orthogonal to resource management, it can also be used in conjunction with advanced resource-management schemes.

Authors and Affiliations

Dr. B. Mukunthan
Research Advisor, Jairam's Arts and Science College,Karur, Tamilnadu, India
S. Dhayananthi
Research Advisor, Jairam's Arts and Science College,Karur, Tamilnadu, India

DoS, Hop-Count Filtering, Hop-Count Inspection, spoofed, ns2, matlab

  1. S. Specht and R. Lee. "Taxonomies of distributed denial of service networks, attacks, tools, and countermeasures", Technical Report CE-L2003-03, 164, May 2003.
  2. http://www.w3.org/security/faq/wwwsf6.html.
  3. Graham Wheeler. Denial-of-service:courting disaster. Technical Re-port,CEQURUX Technologies.
  4. Haining Wang , Cheng Jin and Kang G. Shin. Hop-count filtering: "An effective defense against spoofed traffic", Technical Report,The Pennsylvania State University, 2003.
  5. Christos Douligeris and Aikaterini Mitrokotsa. Ddos attacks and defense mechanisms: "A classi¯cations. Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technolog"y, pages 190-193, December 2003.
  6. http://www.wired.com/news/business/0,1367,34221, 00.html Yahoo on Trail of Site Hackers, February 2000.
  7. Ceilyn Boyd John Zao David Mankins, Rajesh Krishnan and Michael Frentz. Mitigating distributed denial of service attacks with dynamic resource pricing. Proceedings of 17th Annual Conference on Computer Security Applications , 2001. ACSAC 2001, pages 411-421, 2001.
  8. M. Fullmer and S. Romig. The osu °ow-tools package and cisco netflowlogs. In Proceedings of USENIX LISA'2000, New Orleans, LA, December 2000

Publication Details

Published in : Volume 4 | Issue 9 | July-August 2018
Date of Publication : 2018-07-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 185-190
Manuscript Number : IJSRST184936
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

Dr. B. Mukunthan, S. Dhayananthi, " Analysis on DDoS Attack using a Probabilistic Approach", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 4, Issue 9, pp.185-190, July-August-2018.
Journal URL : https://ijsrst.com/IJSRST184936
Citation Detection and Elimination     |      | |
  • http://www.w3.org/security/faq/wwwsf6.html.
  • Graham Wheeler. Denial-of-service:courting disaster. Technical Re-port,CEQURUX Technologies.
  • Haining Wang , Cheng Jin and Kang G. Shin. Hop-count filtering: "An effective defense against spoofed traffic", Technical Report,The Pennsylvania State University, 2003.
  • Christos Douligeris and Aikaterini Mitrokotsa. Ddos attacks and defense mechanisms: "A classi¯cations. Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technolog"y, pages 190-193, December 2003.
  • http://www.wired.com/news/business/0,1367,34221, 00.html Yahoo on Trail of Site Hackers, February 2000.
  • Ceilyn Boyd John Zao David Mankins, Rajesh Krishnan and Michael Frentz. Mitigating distributed denial of service attacks with dynamic resource pricing. Proceedings of 17th Annual Conference on Computer Security Applications , 2001. ACSAC 2001, pages 411-421, 2001.
  • M. Fullmer and S. Romig. The osu °ow-tools package and cisco netflowlogs. In Proceedings of USENIX LISA'2000, New Orleans, LA, December 2000
  • " target="_blank"> BibTeX
    |
  • http://www.w3.org/security/faq/wwwsf6.html.
  • Graham Wheeler. Denial-of-service:courting disaster. Technical Re-port,CEQURUX Technologies.
  • Haining Wang , Cheng Jin and Kang G. Shin. Hop-count filtering: "An effective defense against spoofed traffic", Technical Report,The Pennsylvania State University, 2003.
  • Christos Douligeris and Aikaterini Mitrokotsa. Ddos attacks and defense mechanisms: "A classi¯cations. Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technolog"y, pages 190-193, December 2003.
  • http://www.wired.com/news/business/0,1367,34221, 00.html Yahoo on Trail of Site Hackers, February 2000.
  • Ceilyn Boyd John Zao David Mankins, Rajesh Krishnan and Michael Frentz. Mitigating distributed denial of service attacks with dynamic resource pricing. Proceedings of 17th Annual Conference on Computer Security Applications , 2001. ACSAC 2001, pages 411-421, 2001.
  • M. Fullmer and S. Romig. The osu °ow-tools package and cisco netflowlogs. In Proceedings of USENIX LISA'2000, New Orleans, LA, December 2000
  • " target="_blank">RIS
    |
  • http://www.w3.org/security/faq/wwwsf6.html.
  • Graham Wheeler. Denial-of-service:courting disaster. Technical Re-port,CEQURUX Technologies.
  • Haining Wang , Cheng Jin and Kang G. Shin. Hop-count filtering: "An effective defense against spoofed traffic", Technical Report,The Pennsylvania State University, 2003.
  • Christos Douligeris and Aikaterini Mitrokotsa. Ddos attacks and defense mechanisms: "A classi¯cations. Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technolog"y, pages 190-193, December 2003.
  • http://www.wired.com/news/business/0,1367,34221, 00.html Yahoo on Trail of Site Hackers, February 2000.
  • Ceilyn Boyd John Zao David Mankins, Rajesh Krishnan and Michael Frentz. Mitigating distributed denial of service attacks with dynamic resource pricing. Proceedings of 17th Annual Conference on Computer Security Applications , 2001. ACSAC 2001, pages 411-421, 2001.
  • M. Fullmer and S. Romig. The osu °ow-tools package and cisco netflowlogs. In Proceedings of USENIX LISA'2000, New Orleans, LA, December 2000
  • " target="_blank">CSV

    Article Preview