A Lightweight Approach to Detect the Low/High Rate IP Spoofed Cloud DDoS Attacks

作者: Neha Agrawal , Shashikala Tapaswi

DOI: 10.1109/SC2.2017.25

关键词:

摘要: In cloud computing, broadly two facets of Distributed Denial-of-Service (DDoS) attack exist. The attacker uses Internet Protocol (IP) spoofing technique for launching the DDoS to disguise source's identity. Consequently, its detection becomes a crucial and challenging task. objective paper is propose an adaptive lightweight approach which can detect low high rate spoofed traffic accurately. implemented in closed environment. experimental results showed that effectively internal external low/high attacks with 99.3% accuracy provides better performance.

参考文章(20)
Hyo Sung Kang, Jae Hyeok Son, Choong Seon Hong, Defense technique against spoofing attacks using reliable ARP table in cloud computing environment asia pacific network operations and management symposium. pp. 592- 595 ,(2015) , 10.1109/APNOMS.2015.7275401
Opeyemi.A. Osanaiye, Mqhele Dlodlo, TCP/IP header classification for detecting spoofed DDoS attack in Cloud environment conference on computer as a tool. pp. 1- 6 ,(2015) , 10.1109/EUROCON.2015.7313736
Ping Du, Akihiro Nakao, Mantlet Trilogy: DDoS Defense Deployable with Innovative Anti-Spoofing, Attack Detection and Mitigation international conference on computer communications and networks. pp. 1- 7 ,(2010) , 10.1109/ICCCN.2010.5560170
Toby Ehrenkranz, Jun Li, On the state of IP spoofing defense ACM Transactions on Internet Technology. ,vol. 9, pp. 1- 29 ,(2009) , 10.1145/1516539.1516541
A. Yaar, A. Perrig, D. Song, StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense IEEE Journal on Selected Areas in Communications. ,vol. 24, pp. 1853- 1863 ,(2006) , 10.1109/JSAC.2006.877138
Fu-Yuan Lee, Shiuhpyng Shieh, Defending against spoofed DDoS attacks with path fingerprint Computers & Security. ,vol. 24, pp. 571- 586 ,(2005) , 10.1016/J.COSE.2005.03.005
Haining Wang, Cheng Jin, Kang G. Shin, Defense against spoofed IP traffic using hop-count filtering IEEE ACM Transactions on Networking. ,vol. 15, pp. 40- 53 ,(2007) , 10.1109/TNET.2006.890133
Changwang Zhang, Jianping Yin, Zhiping Cai, RSFB: a Resilient Stochastic Fair Blue algorithm against spoofing DDoS attacks international conference on communications. pp. 1566- 1567 ,(2009) , 10.1109/ISCIT.2009.5341033
Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita, Botnet in DDoS Attacks: Trends and Challenges IEEE Communications Surveys and Tutorials. ,vol. 17, pp. 2242- 2270 ,(2015) , 10.1109/COMST.2015.2457491
Wei Chen, Dit-Yan Yeung, Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing international conference on networking. ,vol. 2006, pp. 38- 38 ,(2006) , 10.1109/ICNICONSMCL.2006.72