Distributed Denial of Service attack – Detection and Defense

1331 Words3 Pages

Internet technology has extended to greater degree than it is believed to be. It has become an inevitable part of our lives and we rely totally on the internet for our daily necessities. Internet is a highly unbounded vast network of networks. As Internet keeps growing, there are new threats evolving thus increasing the need to develop and tighten security measures to ensure the protection of it. There are many challenges faced by Internet, Distributed denial of Service is the critical concern for Internet, particularly to internet commerce. Distributed Denial of Service attacks can cause infrastructure problems and can disrupt communications on international level. Access denial to information by attacking the network in illicit way has become common nowadays. In this paper, we will discuss about how to detect and defend network service from the Denial of Service (DioS) and Distributed Denial of Service attack (DDioS).
First, let’s look into what is Distributed Denial of Service attack. DDioS attack is illegal attempt by a single system or a group of people to cause the network site to deny service to its users. DDioS attacks exhaust the victim’s server resources and prevent the victim server from providing service to legitimate users. DDioS attack uses many different network connections and multiple botnets to crash the system or server. During the DDoS attack, users sometimes numbering in the hundreds or even thousands overwhelm a website’s host server with connection requests, slowing the website to a crawl or even causing it to crash entirely. The best way to defend these kinds of attacks is to detect them before it crashes the system (i.e. network service) or while the attack is undergoing. There are several methods ava...

... middle of paper ...

...ess and egress. With this information, port-flows are tagged, prioritized and URL determines what specific limit rates are. The URL is deployed on the routers and this monitors the inflow and outflow of packets through the routers in the view of ingress and egress. Based on the traffic pattern extracted and the port flow aggregation, the port-flows are prioritized. Then the limiting rates are calculated for each port-flow. Based on the prioritization, the port flows traffic is suppressed and congested links are brought to upper limit bandwidth to mitigate the DDioS attacks. To sum up, in this technique traffic increasing patterns are analyzed. Then the traffic aggregates are prioritized and divided into subsets based on the pattern extracted. After that traffic aggregate that includes DDioS attack is suppressed to greater degree which mitigates the DDioS attack.

More about Distributed Denial of Service attack – Detection and Defense

Open Document