Analysis of IP Spoofed DDoS Attack by Cryptography
Journal Title: International Journal of Computational Engineering and Management IJCEM - Year 2013, Vol 16, Issue 2
Abstract
Today, the internet is an essential part of our everyday life and many important and crucial services like banking, shopping, transport, health, and communication are partly or completely dependent on the Internet. According to recent sources the number of hosts connected to the internet has increased to almost 4000 million and there are currently more than 1 billion users of the Internet. Thus, any disruption in the operation of the internet can be very inconvenient for most of us as the Internet was originally designed for openness and scalability without much concern for security, malicious users can exploit the design weaknesses of the internet to wreak havoc in its operation. Incidents of disruptive activities like e-mail viruses, computer worms and denial-of service attacks have been on the rise reports an increase of such incidents from 252 in 1990 to 11,37,529 in 2009).The incidents which have raised the most concern in recent years are the denial-of-service (DoS) attacks whose sole purpose is to reduce or eliminate the availability of a service provided over the Internet, to its legitimate users. I explore a mechanisms for defending against ip spoofed packet attacks, have become one of the major threats to the operation of the internet today. I propose a new scheme for detecting and preventing the most harmful and difficult to detect DDoS Attacks—those that use IP address spoofing to disguise the attack flow. I have designed a low-cost and efficient scheme called HEMDADF, for defending against IP spoofed attacks, The HEMDADF scheme is composed of three parts: marking process, filtering process, secure transmission. The marking process requires the participation of routers in the internet to encode path information into packets. We suggest the use of a hash function and secret key to reduce collisions among packet-markings. The scheme also includes mechanisms for detecting and reporting spoofing in a timely manner. The evaluation of the scheme under simulations would be shown that my scheme can effectively and efficiently differentiate between good and bad packets under spoofed attack. Most good packets are accepted even under the most severe attack, whose traffic is about 10 times of normal traffic. At the same time, the bad packet acceptance ratio is maintained at a low level. This scheme can be performs well even under massively IP spoofed attacks involving up to 5000 attackers. HEMDADF scheme detected the occurrence of attack precisely within 3 - 4 seconds. The quick detection is valuable to the victim so that appropriate actions can be taken to minimize the damage caused by an IP spoofed attack.
Authors and Affiliations
Dalip Kumar
Computer Based Training
In this paper, we start by providing an overview of the main components of intelligent tutoring systems. We then provide a brief summary of different types of ITS. Next, we present a detailed discussion of two components...
A Theoretical Analysis for relevancy of files in Enhanced Ranking Based Cloud Search with Improved Metadata Storage
With the outgrowth of cloud computing, a large amount of private information is stored over cloud servers, which is in encrypted format. But searching over encrypted data is very difficult. Earlier search schemes were ba...
The Views on Happiness: A Dialectic Approach
In the era of commercialization and industrialization, people work day and night to survive in the market. In the struggle of survival, they forget the real meaning of the life. They measure everything in terms of the mo...
Rail to Rail Operational Amplifier for Sample & Hold Circuit in Pipeline ADC
The papers presents a 1V rail to rail operational amplifier that has been used as a unity gain buffer in the sample and hold circuit for 1V 10 bit 1Msps pipeline ADC in 0.18µm technology. An open loop architecture is cho...
Cloud Computing Testing Evaluation
Testing becomes an important process in software development not only in terms of exposure but also in terms of performance, usability, safety, security, reusability. Also software testing is an essential activity to sof...