CFP last date
20 December 2024
Reseach Article

Dual-Level Defense Framework for DDoS Attacked Network

by Anjali Sardana, Ramesh C. Joshi
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 25
Year of Publication: 2010
Authors: Anjali Sardana, Ramesh C. Joshi
10.5120/459-763

Anjali Sardana, Ramesh C. Joshi . Dual-Level Defense Framework for DDoS Attacked Network. International Journal of Computer Applications. 1, 25 ( February 2010), 40-49. DOI=10.5120/459-763

@article{ 10.5120/459-763,
author = { Anjali Sardana, Ramesh C. Joshi },
title = { Dual-Level Defense Framework for DDoS Attacked Network },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 25 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 40-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number25/459-763/ },
doi = { 10.5120/459-763 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:48:33.523901+05:30
%A Anjali Sardana
%A Ramesh C. Joshi
%T Dual-Level Defense Framework for DDoS Attacked Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 25
%P 40-49
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

DDoS has become one of the thorniest problems in the Internet, and aims to deny legitimate users of the services they should have. In this paper, we introduce novel dual - level framework that consist of attack detection (D-LAD) and characterization scheme for defending against the DDoS attacks. The macroscopic level detectors (MaLAD) attempt to detect voluminous congestion inducing attacks which cause apparent slowdown in network functionality. The macroscopic level characterization process identifies these large volumes attacks that have been detected early in transit domain by MaLAD. The microscopic level detectors (MiLAD) detect sophisticated attacks that cause network performance to degrade gracefully and remain undetected in transit domain. Microscopic level characterization process identifies such attacks that have been detected at border routers in stub domain near the victim by Mi-LAD. We employ the concepts of change point detection on entropy with time to improve the detection rate. Honeypots help achieve high detection and filtering accuracy. Use of honeypots is proposed that help achieve high detection accuracy.

References
Index Terms

Computer Science
Information Sciences

Keywords

DDoS Framework Honeypots Entropy