Visible to the public Defending network system against IP spoofing based distributed DoS attacks using DPHCF-RTT packet filtering technique

TitleDefending network system against IP spoofing based distributed DoS attacks using DPHCF-RTT packet filtering technique
Publication TypeConference Paper
Year of Publication2014
AuthorsMaheshwari, R., Krishna, C.R., Brahma, M.S.
Conference NameIssues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on
Date PublishedFeb
KeywordsBroadband communication, computer network security, conventional HCF techniques, conventional hop count filtering, DDoS, distributed DoS attacks, distributed probabilistic HCF, Distributed Probabilistic HCF (DPHCF), DPHCF-RTT packet filtering technique, Educational institutions, Hop Count, Hop Count Filtering (HCF), host resources exhaustion, illegitimate packet filtering, information filtering, Intermediate System, IP addresses, IP networks, IP spoofing, MATLAB 7, mitigation techniques, network bandwidth jam, packet filtering, probabilistic HCF techniques, probabilistic hop count filtering, Probabilistic logic, Receivers, Round Trip Time (RTT), Servers, TTL

IP spoofing based DDoS attack that relies on multiple compromised hosts in the network to attack the victim. In IP spoofing, IP addresses can be forged easily, thus, makes it difficult to filter illegitimate packets from legitimate one out of aggregated traffic. A number of mitigation techniques have been proposed in the literature by various researchers. The conventional Hop Count Filtering or probabilistic Hop Count Filtering based research work indicates the problems related to higher computational time and low detection rate of illegitimate packets. In this paper, DPHCF-RTT technique has been implemented and analysed for variable number of hops. Goal is to improve the limitations of Conventional HCF or Probabilistic HCF techniques by maximizing the detection rate of illegitimate packets and reducing the computation time. It is based on distributed probabilistic HCF using RTT. It has been used in an intermediate system. It has the advantage for resolving the problems of network bandwidth jam and host resources exhaustion. MATLAB 7 has been used for simulations. Mitigation of DDoS attacks have been done through DPHCF-RTT technique. It has been shown a maximum detection rate up to 99% of malicious packets.

Citation Key6781280