DDoS Attack Detection and Elimination
Journal Title: GRD Journal for Engineering - Year 2018, Vol 3, Issue 0
Abstract
Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an “army” of compromised nodes hidden in the network. Inferential tools for DDoS mitigation should accordingly enable an early and reliable discrimination of the normal users from the compromised ones. Unfortunately, the recent emergence of attacks performed at the application layer has multiplied the number of possibilities that a botnet can exploit to conceal its malicious activities. New challenges arise, which cannot be addressed by simply borrowing the tools that have been successfully applied so far to earlier DDoS paradigms. In this work, we offer basically three contributions: i) we introduce an abstract model for the aforementioned class of attacks, where the botnet emulates normal traffic by continually learning admissible patterns from the environment; ii) we devise an inference algorithm that is shown to provide a consistent (i.e., converging to the true solution as time elapses) estimate of the botnet possibly hidden in the network; and iii) we verify the validity of the proposed inferential strategy on a testbed environment. Our tests show that, for several scenarios of implementation, the proposed botnet identification algorithm needs an observation time in the order of (or even less than) one minute to i dentify correctly almost all bots, without affecting the normal users’ activity.
Authors and Affiliations
Ragu Raman R, Vinoth Ram S S, Ms. Anitha E
Rural Sustainable Development: A Case of Mota Borsara Village
The concept centers around development of global villages that preserve and nurture the essence of rural community life without compromising on facilities perceived to be essentially urban in nature thus creating altered...
Experimental Investigation and Estimation of Low Cost Pavements in Roads for Storm Water Management
As the cities grow, the number of impermeable surfaces those that do not allow water to infiltrate into the ground can increase. Managing runoff in urban areas becomes difficult and forms flooding. If it is not properly...
Isolated Switched Boost Push Pull DC-DC Step-Up Converter
An isolated switched high step up boost DC-DC converter is discussed in this paper. The main objective of this paper is to step up low voltage to very high voltage. This paper mainly initiates at boosting a 30V DC into 2...
Well Optimized GPSR Routing Protocol for VANET
The Vehicular Ad-Hoc Network, or VANET, is a technology that uses moves cars as nodes in a network to create a mobile network. VANET turns every participating car into a wireless router or node, allowing cars approximate...
A Survey of Information Extraction Using Different Databases
Information extraction is one time process for extraction of a particular kind of relationships of interest from a document collection. Information Extraction is the task of automatically extracting structured informatio...