Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i47/95630
Year: 2016, Volume: 9, Issue: 47, Pages: 1-8
Original Article
S. Suresh1 *and N. Sankar Ram2
1 Sathyabama University, Jeppiaar Nagar, Chennai - 600119, Tamil Nadu, India; [email protected] 2 Department of Computer Science and Engineering, RMK College of Engineering and Technology, Puduvoyal, Thiruvallur - 601206, Tamil Nadu, India; [email protected]
*Author for correspondence
S. Suresh
Sathyabama University, Jeppiaar Nagar, Chennai - 600119, Tamil Nadu, India; [email protected]
Objectives: Network security deals with the various attacks, in which distributed denial of service (DDoS) is a kind of attacks are thriving every day in networks. The specified users of node or theirs network information’s are hidden by Denial of Service (DoS) attack. The aim is to detect the source of attack using improved marking schemes. Method: The nodes and networks are very often affected by the Distributed Denial of Service attack (DDoS) from the category of DoS attack. The affected path of DDoS attacks are identified by various IP trace back schemes. Packet marking approach is one type to detect the source of attack from the identified node. Finding: PPM and DPM techniques were used to detect the DDoS attack but the performance should be improved in both marking scheme. In DPM marking process done by ingress router to avoid marking process in subsequent egress router. Further DPM is improved with hash functions which is also an overloaded in router. MOD server concepts are used to increase the scalability using Dynamic DPM approach. Improvement: To reduce the trace back mechanism procedure and to concern about the memory requirement using Enhanced DPM and DADPM method is considered when detecting the source of attack from the victim node.
Keywords: DADPM, DDoS, DPM, IP Trace back, MOD Server, Source of Attack
Subscribe now for latest articles and news.