CFP last date
20 January 2025
Reseach Article

Detect DDoS Attack using Border Gateways and Edge Routers

by Sowmyadevi.k, Jenitha Vincy.t
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 9
Year of Publication: 2012
Authors: Sowmyadevi.k, Jenitha Vincy.t
10.5120/5719-7779

Sowmyadevi.k, Jenitha Vincy.t . Detect DDoS Attack using Border Gateways and Edge Routers. International Journal of Computer Applications. 42, 9 ( March 2012), 9-13. DOI=10.5120/5719-7779

@article{ 10.5120/5719-7779,
author = { Sowmyadevi.k, Jenitha Vincy.t },
title = { Detect DDoS Attack using Border Gateways and Edge Routers },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 9 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number9/5719-7779/ },
doi = { 10.5120/5719-7779 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:32:04.546758+05:30
%A Sowmyadevi.k
%A Jenitha Vincy.t
%T Detect DDoS Attack using Border Gateways and Edge Routers
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 9
%P 9-13
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The system is design to implement an identification and classification algorithm for tracing DDoS attack and multicast attack information to a edge router using cyclical deterministic packet marking (CDPM) method. Edge router registry stores the received packet IP source address and mark the packet. An Identification and classification algorithm implemented on Border gateway. An algorithm based on received packet and path variation. Border gateways analyze the packet path and number of request received from particular source address. And classify the packet if attacker multicast the attack packet information to edge router and intermediate router or if legitimate packet the border gateway allow to use server. Finally edge router can update their registry and block the attacker IP source address from home network itself. In our proposed model we identify an attack source and multicast the information to an edge router.

References
  1. Xiaoming Bi, Qiansheng Zheng (july 2010), 'study On Network Safety Strategy Against Ddos Attack' Ieee International Conference On Advanced Management Science (icams).
  2. Wei Yen, Chao-cheng-huang (oct 2007), 'cyclical Deterministic Packet Marking' Ieee International Conference On System, Man And Cybernetics( Isic ).
  3. S. Savage, D. Wetherall, A. Karlin, And T. Anderson (jun 2001), 'network Systems Support For Ip Traceback' Ieee-acm Transactions On Networking, Vol. 9, Pp. 226-237.
  4. D. X. Song And A. Perrig (2001), 'advanced And Authenticated Marking Schemes For Ip Traceback' In Proceedings - Ieee Infocom, Pp. 878-886.
  5. A. Belenky And N. Ansari (apr 2003), 'ip Traceback With Deterministic Packetmarking' Ieee Communications Letters, Vol. 7, Pp. 162164. .
  6. R. P. Laufer, P. B. Velloso, D. D. O. Cunha, I. M. Moraes, M. D. D. Bicudo, M. D. D. Moreira, And O. C. M. B. Duarte (2007), 'towards Stateless Single-packet Ip Traceback' In 32nd Ieee Conference On Local Computer Networks, Washington, Pp. 548-555.
  7. A. Castelucio, A. Ziviani, And R. M. Salles (2009), 'an As-level Overlay Network For Ip Traceback' In Ieee Network. Vol. 23, Pp. 36-41.
  8. Yang-seo Choi, Jin-tae Oh, Jong-soo Jang, Jae-cheol Ryou (aug 2010), 'integrated Ddos Attack Defense Infrastructure For Effective Attack Prevention' Ieee 2nd International Conference On Information Technology Convergence And Services (itcs).
  9. Feng Qiaojuan,wei Xinhong (2010), 'a New Research On Dos/ddos Security Detection Model' Ieee 2nd International Conference On Computer Engineering And Technology, Vol. 3.
  10. Y. Bavani, P. Niranjan Reddy (july 2010), 'an Efficient Ip Traceback Through Packet Marking Algorithm' International Journal Of Network Security And Its Application, Vol 2, No. 3.
  11. Baijian Yang, Prasant Mohapatra (june 2005), 'edge Router Multicasting With Mpls Traffic Engineering' Ieee Communications Letters.
  12. Linfeng Zhang, Yong Guan (2005), 'topo: A Topology-aware Single Packet Attack Traceback Scheme' Department Of Electrical And Computer Engineering, Iowa State University.
  13. Robert Stone (2003), 'centertrack: An Ip Overlay Network For Tracking Dos Floods' Uunet Technologies, Inc.
  14. Javad Ebrahimi, Christina Fargouli (2010), 'multicasting Algorithm For Deterministic Networks' On Computer And Communication Sciences.
  15. S. Savage, D. Wetherall, A. Karlin, And T. Anderson (jun 2001), 'network Systems Support For Ip Traceback' Ieee-acm Transactions On Networking, Vol. 9, Pp. 226-237.
  16. D. X. Song And A. Perrig (2001), 'advanced And Authenticated Marking Schemes For Ip Traceback' In Proceedings - Ieee Infocom, Pp. 878-886.
Index Terms

Computer Science
Information Sciences

Keywords

Edge router gateway legitimate user multicasting packet marking