Indian Journal of Science and Technology
Year: 2015, Volume: 8, Issue: 32, Pages: 1-5
M. A. Vinoth Kumar1 and R. Udayakumar2*
1 Department of Information Technology, Jerusalem College of Engineering, Chennai - 600100, Tamil Nadu, India; [email protected]
2 Department of Information Technology, Bharath University, Chennai - 600073, Tamil Nadu, India; [email protected]
The technique to prevent and block Distributed Denial of Service (DDoS)1 attacks has become the most difficult task, because as the attackers have lot of new trend hardware and software devices and techniques to disturb the network resources. DDoS attacks is the most vulnerable threat for all internet users and identifying these kinds of attacks as soon as it initiated from the attackers and successfully preventing it not to cause damage to network. The effective method to protect ICMP flooding DDoS attack is most required technique for these modern network security systems. The high rate of ICMP DDoS attack focuses on denying a ICMP services or its related equipments to its intended users. The high rate of attack is typically detected and blocked by the ISPs (Internet Service Providers)2 level, by forming protecting virtual rings around the preventing hosts which will defend against the high level of attacks by exchanging selected traffic details with multiple Intrusion Detection System and Intrusion Prevention System3 using a technique called FireCol4. The another most vulnerable attack called low-rate ICMP DDoS flooding5 has the ability to gradually obscure its traffic as it is much a like to ordinary traffic. The potential technique to stop this form of attack by means of HAWK (Halting Anomaly with Weighted Choking)6 system, this is based on threshold level of the packet flow is being implemented. By combining both these techniques, the increasing security threats of low and high level of ICMP flooding DDoS attacks may be identified and block to the greatest level and it can also promise that a service will never be denied to its anticipated user.
Keywords: DDoS, Flooding, High Rate ICMP Flooding, ICMP, Low Rate ICMP, Network Security, Passive Attack
Subscribe now for latest articles and news.