Advanced Computing and Communication Techniques for High Performance Applications |
Foundation of Computer Science USA |
ICACCTHPA2014 - Number 2 |
February 2015 |
Authors: Mensah Sitti, Gideon Naah, Daniel Owusu-donkor |
396487fd-7d5d-47fa-b888-8a7d12b58f6b |
Mensah Sitti, Gideon Naah, Daniel Owusu-donkor . A Proactive Approach towards DDoS Management In Shortest Path Bridging. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 2 (February 2015), 18-22.
Changes in technology have affected a large number of sections in the domain of Ethernet. Cloud computing has provided a new dimension for virtual networks (VLAN) as well. These changes have help shaped the paradigm of computer networks on the whole and continues to be the back bone of linking various datacenters. With the introduction of shortest path bridging (approved by IEEE as 802. 1aq) computer networks will experience a more refined way of getting things done in a very excellent way. Distributed Denial of Service (DDoS) on the other hand has affected computer systems and networks to a large degree, although solutions have been provided to contain the situation. Attackers typically exploit well-known vulnerabilities, many of which have readily available fixes. Complicating matters are the intrusion tools that are widely available. Intruders have automated the processes for discovering vulnerable sites, compromising them, installing daemons, and concealing the intrusion. Even security-conscious sites can suffer a denial of service because attackers can control other, more vulnerable computer systems and use them against the more secure site. The use of shortest path bridging to manage DDoS attack is not only to help contain the situation but to also provide a way out and render the attacker helpless. This paper suggests ways that can be used by a victim computer to counter a DDoS attack from a possible attacker or an unintentional attack. It helps to safeguard the user against unwarranted service which might command a computer to do without necessarily being aware. The simulation was conducted on a Linux operating system using ns3 and result obtained gives a promising future to pursue further work on the use of IEEE 802. 1aq Shortest Path Bridging in managing Distributed Denial of service (DDoS).