Papers by Archana Pimpalkar

International Journal of Innovative Research in Computer and Communication Engineering, 2015
Distributed Denial of Service (DDoS) attacks is launched by large number of compromised host to i... more Distributed Denial of Service (DDoS) attacks is launched by large number of compromised host to interrupt the services of the legitimate users. It is most challenging to defense against such attacks because most of the attacker use source IP address spoofing in order to hide their identity and such attack packets appear to the target server as if they came from a legitimate client. In this paper, defense mechanism is presented that classify packets as legitimate or attack using cryptographic technique and filter the attack packets. Once the packets are classified attack packets are dropped at the border router of the target network before reaching the victim. The mechanism is easy to implement without requiring restrictions or additional changes to internet routing protocols. The efficiency of algorithm in identifying spoof attack packets is evaluated by simulation experiments in NS3.

International Journal of Innovative Research in Computer and Communication Engineering, 2015
Distributed Denial of Service (DDoS) attacks is launched by large number of compromised host to i... more Distributed Denial of Service (DDoS) attacks is launched by large number of compromised host to interrupt the services of the legitimate users. It is most challenging to defense against such attacks because most of the attacker use source IP address spoofing in order to hide their identity and such attack packets appear to the target server as if they came from a legitimate client. In this paper, defense mechanism is presented that classify packets as legitimate or attack using cryptographic technique and filter the attack packets. Once the packets are classified attack packets are dropped at the border router of the target network before reaching the victim. The mechanism is easy to implement without requiring restrictions or additional changes to internet routing protocols. The efficiency of algorithm in identifying spoof attack packets is evaluated by simulation experiments in NS3.

Distributed Denial of Service (DDoS) attacks is the most challenging problems for network securit... more Distributed Denial of Service (DDoS) attacks is the most challenging problems for network security. The attacker uses large number of compromised hosts to launch attack on victim. Various DDoS defense mechanisms aim at detecting and preventing the attack traffic. Source IP address spoofing is one of the most common ways of launching Distributed Denial of Service attacks. In these types of attacks, attack packet’s true origin is difficult to identify. Thus, it is very challenging to detect attack packets and handle defense mechanisms against such attacks. In this paper, defense mechanism uses cryptographic technique for identifying attack packets with source IP address spoofing and dropping those attack packets. This mechanism does not require restrictions or changes to internet routing protocols and is easy to deploy. The algorithm is efficient in identifying spoof attack packets and its effectiveness is evaluated by simulation experiments in NS3.

2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015
Distributed Denial of Service (DDoS) attacks is launched by large number of compromised host to i... more Distributed Denial of Service (DDoS) attacks is launched by large number of compromised host to interrupt the services of the legitimate users. It is most challenging to defense against such attacks because most of the attacker use source IP address spoofing in order to hide their identity and such attack packets appear to the target server as if they came from a legitimate client. In this paper, defense mechanism is presented that classify packets as legitimate or attack using cryptographic technique and filter the attack packets. Once the packets are classified attack packets are dropped at the border router of the target network before reaching the victim. The mechanism is easy to implement without requiring restrictions or additional changes to internet routing protocols. The efficiency of algorithm in identifying spoof attack packets is evaluated by simulation experiments in NS3.
Uploads
Papers by Archana Pimpalkar