Academia.eduAcademia.edu
paper cover icon
DDoS Attack Mitigation Using Random and Flow-Based Scheme

DDoS Attack Mitigation Using Random and Flow-Based Scheme

Data, Engineering and Applications, 2019
Bineet Kumar Joshi
Abstract
A DDoS attack is known to deny services to legitimate users. IP trace back and attack detection are one of the main components in saving a network from such an attack. One of the key challenges is to reduce the number of packets required for trace back. Also, an attacker can spoof its IP address in order to disguise its identity. In this paper, we propound an entropy variation technique to detect the attack and a random and flow-based scheme to trace back the attack. Our algorithm is meant to deal with DDoS detection and trace back. We have also kept IP spoofing into consideration. We have defined a threshold time to check for an attack. This algorithm shows better space utilization, and works well in separating legitimate from illegitimate traffic. Our paper is divided into four parts—introduction, related work, analysis, and conclusion. Introduction consists of the basic introduction of DoS and DDoS attacks and the techniques used for the prevention, detection, and trace back of s...

Bineet Kumar Joshi hasn't uploaded this paper.

Create a free Academia account to let Bineet know you want this paper to be uploaded.

Ask for this paper to be uploaded.