• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2016, Volume: 9, Issue: 47, Pages: 1-8

Original Article

A Review on Various DPM Traceback Schemes to Detect DDoS Attacks

Abstract

Objectives: Network security deals with the various attacks, in which distributed denial of service (DDoS) is a kind of attacks are thriving every day in networks. The specified users of node or theirs network information’s are hidden by Denial of Service (DoS) attack. The aim is to detect the source of attack using improved marking schemes. Method: The nodes and networks are very often affected by the Distributed Denial of Service attack (DDoS) from the category of DoS attack. The affected path of DDoS attacks are identified by various IP trace back schemes. Packet marking approach is one type to detect the source of attack from the identified node. Finding: PPM and DPM techniques were used to detect the DDoS attack but the performance should be improved in both marking scheme. In DPM marking process done by ingress router to avoid marking process in subsequent egress router. Further DPM is improved with hash functions which is also an overloaded in router. MOD server concepts are used to increase the scalability using Dynamic DPM approach. Improvement: To reduce the trace back mechanism procedure and to concern about the memory requirement using Enhanced DPM and DADPM method is considered when detecting the source of attack from the victim node.

Keywords: DADPM, DDoS, DPM, IP Trace back, MOD Server, Source of Attack

DON'T MISS OUT!

Subscribe now for latest articles and news.