A Meliorated Defense Mechanism for Flooding Based Attacks
Gayatri Bhatti1, Upma Goyal2, Prabhdeep Singh2
Manuscript received on February 04, 2013. | Revised Manuscript received on February 27, 2013. | Manuscript published on March 05, 2013. | PP: 319-323 | Volume-3 Issue-1, March 2013. | Retrieval Number: A1388033113
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The Distributed Denial of service (DDoS) attacks, over a past few years are found to be a disaster to the Internet. A flooding-based attack attacks the victim machine by sending an excessive amount of illegitimate traffic to it. The defence mechanisms existing before are unable to prevent the systems from these attacks, since it is very difficult to trace the spoofed packets and distinguished between the legitimate and illegitimate attack traffic. Flooding-based DDoS attacks use agents to send the traffic and sometimes prefer Reflectors in order to forward the traffic to the target, thereby making it impossible to be detected. So, this paper will propose a defence mechanism pronounced as Hop-based DDoS defence procedure. This mechanism will comprise of three components: detection of illegitimate packets, IP traceback of the illegitimate packets and the traffic control. This framework shows high performance in defending against the flooding-based attacks.
Keywords: DDoS, Defence, Flooding, Hop, Traffic.