Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Distinguish DDoS Attacks and Suggesting Some Counter Measures For Distributed P2P Networks

Author : Gera Jaideep 1 R.V.Kishore Kumar 2 Dr.B.V.V.S.Prasad 3

Date of Publication :16th November 2017

Abstract: Peer-to-Peer networks became more popular in now days because of its useful delivery services. It utilizes distributed resources to perform some intended activities. Because of its distributed in nature they are widely used in file sharing. For every network there is a common problem that is an attack, it may of many types in those most complicated and highly threatening and hard to detect attack in distributed Peer-to-Peer network is Distributed Denial of Service (DDoS) attack. An attack that interrupts the services to all the users is DDoS attack. Many techniques are in existence to solve the DDoS attack but still hard to respond in short time to flooding based DDoS attacks. The reason is this attack is made by intruders or opponents who use large number of attacking machines by a method of source address spoofing. In this paper we proposed architecture, this designed structure defend and detect DDoS attacks. Here we can resolve this with the help of two important parameters. Time-to-Live (TTL) value and the distance between victims source to victim’s destination. This architecture can take care of agent-based trace back, traffic control and detection of DDoS attack. The proposed methodology can detect and prevent DDoS attacks and ensure Quality of service for real traffic.

Reference :

    1. Saman Taghavi Zargar, James Joshi and David Tipper. (2013). A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE COMMUNICATIONS SURVEYS & TUTORIALS, p1-24.
    2. Monowar H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya and J. K. Kalita. (2012). Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions. The Computer Journal, p1-20.
    3. Hossein Rouhani Zeidanloo, Mohammad Jorjor Zadeh shooshtari, Payam Vahdani Amoli, M. Safari and Mazdak Zamani. (2010). A Taxonomy of Botnet Detection Techniques. IEEE , p1-5.
    4. Moti Geva, Amir Herzberg and Yehoshua Gev. (2013). Bandwidth Distributed Denial of Service: Attacks and Defenses. IEEE. 10, p1-10.
    5. Chenfeng Vincent Zhou, Christopher Leckie and Shanika Karunasekera. (2010). A survey of coordinated attacks and collaborative intrusion detection. Elsevier, p1 2 4 – 1 4 0.
    6. Christian Rossow. (2014). Amplification Hell: Revisiting Network Protocols for DDoS Abuse. Internet Society, p1-15
    7. Thomas Locher, DavidMysicka, Stefan Schmid, and Roger Wattenhofer. (2010). Poisoning the Kad Network. Springer-Verlag Berlin Heidelberg , p195–206.
    8. Kai Hwang and Deyi Li. (2010). Trusted Cloud Computing with Secure Resources and Data Coloring. IEEE , p1-9.
    9. Scott C.-H. Huang, David MacCallum and Ding-Zhu Du. (2010). Network Security. Springer , p1-284
    10. Gianluca Ciccarelli and Renato Lo Cigno. (2011). Collusion in Peer-to-Peer Systems. Computer Networks. 55 , p3517–3532
    11.  MinJi Kim, Luısa Lima, Fang Zhao, Joao Barros, Muriel Medard, Ralf Koetter, Ton Kalker and Keesook J. Han. (2009). On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks. IEEE , p1-26.
    12. Hossein Rouhani Zeidanloo, Azizah Bt Manaf, Payam Vahdani, Farzaneh Tabatabaei, Mazdak Zamani. (2010). Botnet Detection Based on Traffic Monitoring. 201O International Conference on Networking and Information Technology, p1-5.
    13. Shui Yu, Wanlei Zhou, Weijia Jia, Song Guo, Yong Xiang, and Feilong Tang. (2012). Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. 23 (6), p1-8.
    14. Jerome Francois, Issam Aib and Raouf Boutaba, Fellow. (2014). FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks. IEEE , p1-15
    15. Z. Jin, S. Anand and K. P. Subbalakshmi. (2010). Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks. IEEE, p1-5
    16. Sabu M.Thampi , Albert Y.Zomaya, Thorsten Strufe, Jose M.Alcaraz Calero and Tony Thomas(2012).Recent Trends in Computer Networks and Distributed Systems Security , International Conference, SNDS 2012, Trivandrum.
    17. B.V.V.S. Prasad, Multicasting in MANET’s Through Scalable Mobility – Aware Virtual Tree Based Geographic routing Protocol, Voluem 4, Issue 1, January 2013. ISSN: 2229 – 5518

Recent Article