We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Performance Evaluation of Centralized Multicasting Network over ICMP Ping Flood for DDoS

by Ashish Kumar, Ajay K Sharma, Arun Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 37 - Number 10
Year of Publication: 2012
Authors: Ashish Kumar, Ajay K Sharma, Arun Singh
10.5120/4641-4361

Ashish Kumar, Ajay K Sharma, Arun Singh . Performance Evaluation of Centralized Multicasting Network over ICMP Ping Flood for DDoS. International Journal of Computer Applications. 37, 10 ( January 2012), 1-6. DOI=10.5120/4641-4361

@article{ 10.5120/4641-4361,
author = { Ashish Kumar, Ajay K Sharma, Arun Singh },
title = { Performance Evaluation of Centralized Multicasting Network over ICMP Ping Flood for DDoS },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 37 },
number = { 10 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume37/number10/4641-4361/ },
doi = { 10.5120/4641-4361 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:23:56.393299+05:30
%A Ashish Kumar
%A Ajay K Sharma
%A Arun Singh
%T Performance Evaluation of Centralized Multicasting Network over ICMP Ping Flood for DDoS
%J International Journal of Computer Applications
%@ 0975-8887
%V 37
%N 10
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper evaluates the performance of Centralized multicasting network with two sources and four receivers, attacked by five attacker. Attackers attacked the source 1 in network by ICMP Ping Flood. Here we execute the simulation and draw network throughput between source 1 and source 2, queuing transmission delay and drop out data packets at source 1 for ping packet size of 16, 64 and 96 Bytes for 500, 1500 and 2500 ping packets per second. Simulation is done using Network Simulator (NS2) on Linux and the graphs are drawn using xgraph.

References
  1. . Monika Sachdeva, Krishan Kumar, Gurvinder Singh, Kuldip Singh, “Performance Analysis of Web Service under DDoS Attacks”, 2009 IEEE International Advance Computing Conference (IACC 2009) Patiala, India, 6-7 March 2009.
  2. . J. Mirkovic, D-WARD: Source-End Defense Against Distributed Denial-of-service Attacks, Ph.D. Thesis, University of California, Los Angeles, 2003.
  3. . J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communications Review, Volume 34, Issue 2, pp. 39-53, April, 2004.
  4. . R.K.C. Chang, "Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial," IEEE Communication Magazine, pp. 42-51, 2002.
  5. . Ping Flooding, can be found at: http://tomicki.net/ping.flooding.php
  6. . Ping Flood (ICMP Echo) Detection, Can be found at: http://www.daxnetworks.com/Technology/TechDost/TD-101304-Ping%20Flood(ICMP%20Echo)%20Detection.pdf
  7. . S.Keshav and S.Paul, “Centralized Multicast”, IEEE Network Protocols, 1999. (ICNP '99) Proceedings, 31 Oct.-3 Nov. 1999.
  8. . Multicasting White paper ,Allied Telesis,Can be found at http://www.alliedtelesis.com/media/pdf/multicasting_wp.pdf
  9. . Arash Dana and Ahmad Malekloo,“Performance Comparison between Active and Passive Queue Management” ,IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No5, May 2010
  10. . Distributed Denial of Service (DDoS),can be found at http://www.cert.org/homeusers/ddos.html
  11. . Shigang Chen, Member,IEEE, and Qingguo Song, (2005), Perimeter– based Defense against Bandwith DDoS Attacks, IEEE Transactions on parallel and Distributed systems, Vol.16,No.6, Digital Object Identifier: 10.1109/TPDS.2005.74.
  12. . S.Gavaskar, R.Surendiran, Dr.E.Ramaraj, “Three Counter Defense Mechanism for TCP SYN Flooding Attacks”, International Journal of Computer Applications (0975 – 8887) Volume 6– No.6, September 2010.
  13. . Christos Douligeris, Aikaterini Mitrokotsa, “DDoS attacks and defense mechanisms: classification and state-of-the-art”, Elsevier, Computer Networks 44 (2004) 643–666.
Index Terms

Computer Science
Information Sciences

Keywords

PIM-DM Drop Tail DDoS PING Flood Data Multicasting NS2