A DDoS attack is known to deny services to legitimate users. IP trace back and attack detection are one of the main components in saving a network from such an attack. One of the key challenges is to reduce the number of packets required for trace back. Also, an attacker can spoof its IP address in order to disguise its identity. In this paper, we propound an entropy variation technique to detect the attack and a random and flow-based scheme to trace back the attack. Our algorithm is meant to deal with DDoS detection and trace back. We have also kept IP spoofing into consideration. We have defined a threshold time to check for an attack. This algorithm shows better space utilization, and works well in separating legitimate from illegitimate traffic. Our paper is divided into four parts—introduction, related work, analysis, and conclusion. Introduction consists of the basic introduction of DoS and DDoS attacks and the techniques used for the prevention, detection, and trace back of s...
Bineet Kumar Joshi hasn't uploaded this paper.
Create a free Academia account to let Bineet know you want this paper to be uploaded.