Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
A Distributed Approach to Defend Web Service from DDoS Attacks
Monika Sachdeva, Gurvinder Singh, Kuldip Singh
Pages - 346 - 355 | Revised - 01-07-2011 | Published - 05-08-2011
MORE INFORMATION
KEYWORDS
DDoS, Centralized Defense, Distributed Defense, Deployment, Source Address Entropy, Traffic Cluster Entropy
ABSTRACT
Most of the business applications on the Internet are dependent on web services for their transactions. Distributed denial of service (DDoS) attacks either degrade or completely disrupt web services by sending flood of packets and requests towards the victim web servers. An array of defense schemes are proposed but still defending web service from DDoS attacks is largely an unsolvable problem so far. In this paper, DDoS defense schemes are classified into centralized and distributed and their relative advantages and disadvantages are explored. An ISP based distributed approach is a pragmatic solution to defend from DDoS attacks due to its autonomous control, more resources, and incremental scope. Traffic cluster entropy is conceptualized from source address entropy and the combination is used to detect various types of DDoS attacks against the web service. A framework is proposed which can detect the attack, characterize attack sources, and filter the attack packets as early as possible so as to minimize the collateral damage
1 | Angaitkar, A. V., Shekokar, N., & Maurya, M. The Countering the XDoS Attack for Securing the Web Services. |
2 | Mahajan, D., & Sachdeva, M. (2013, December). Distinguishing DDoS Attack from Flash Event Using Real-World Datasets with Entropy as an Evaluation Metric. In Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on (pp. 90-94). IEEE. |
1 | Google Scholar |
2 | CiteSeerX |
3 | refSeek |
4 | Libsearch |
5 | Bielefeld Academic Search Engine (BASE) |
6 | Scribd |
7 | SlideShare |
8 | PdfSR |
A. D. Keromytis, V. Misra, and D. Rubenstein. “SOS: An Architecture For Mitigating DDoS Attacks.” IEEE Journal on Selected Areas in Communication, Vol. 22, No.1, pp. 176-188, 2004. | |
C. Douligeris and A. Mitrokotsa. “DDoS attacks and defense mechanisms: classification and state-of-the-art.” Computer Networks, Vol. 44, No. 5, pp. 643–666, April 2004. | |
C. E. Shannon and W. Weaver. The Mathematical Theory of Communication. University of Illinois Press, 1963. | |
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan. “CROSSACK: Coordinated Suppression of Simultaneous Attacks”, Proceedings of DISCEX, pp. 2-13, 2003. | |
G. Carl, G. Kesidis, R. R. Brooks, and S. Rai. “Denial-of-Service Attack - Detection Techniques.” IEEE Internet Computing, Vol. 10, No. 1, pp. 82-89, Feb. 2006. | |
G. Oikonomou, J. Mirkovic, P. Reiher, and M. Robinson. “ A Framework for a Collaborative DDoS Defense”, Proceedings of the 22nd Annual Computer Security Applications Conference, pp. 33-42, 2006. | |
J. Mirkovic and P. Reiher. “A Taxonomy of DDoS Attack and DDoS Defense Mechanisms.” ACM SIGCOMM Computer Communications Review, Volume 34, No. 2, pp. 39-53, April, 2004. | |
J. Mirkovic. “D-WARD: Source-End Defense Against Distributed Denial-of-service Attacks.” Ph.D. Thesis, University of California, Los Angeles, 2003 | |
K. Kumar, R.C. Joshi, and K. Singh. “An ISP Level Distributed approach to detect DDoS Attacks.” Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications, ISBN: 978-1-4020-6265-0 (Print) 978-1-4020-6266-7 (Online), Springer Netherlands, DOI 10.1007/978-1-4020-6266-7, Pages 235-240, September 04, 2007. | |
K. Kumar. “Protection from Distributed Denial of Service (DDoS) Attacks in ISP Domain.” Ph.D. Thesis, Indian Institute of Technology, Roorkee, India, 2007. | |
L. Feinstein, D. Schnackenberg, R. Balpuari, and D. Kindred. “Statistical Approaches to DDoS Attack Detection and Response” ,In Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX’03), Vol. 1, pp. 303-314, 2003. | |
M. Caesar and J. Rexford. “BGP routing policies in ISP networks,” | |
M. Robinson, J. Mirkovic, M. Schnaider, S Michel, and P. Reiher,”Challenges and principles of DDoS defense,” ACM SIGCOMM, 2003. | |
M. Sachdeva, G. Singh, K. Kumar and K. Singh. “A Comprehensive Survey of Distributed Defense Techniques against DDoS attacks.” International Journal of Computer Science and Network Security (IJCSNS), ISSN: 1738-7906, VOL.9 No.12, December 2009, pp. 7-15. | |
M. Sachdeva, G. Singh, K. Kumar and K. Singh. “DoS Incidents and their impact: A review.” The International Arab Journal of Information Technology IAJIT, ISSN: 1683-3198, Vol. 7, No. 1, January 2010, pp. 14-22. | |
S. Chen and Q. Song. “Perimeter-Based Defense against High Bandwidth DDoS Attacks.” IEEE Transactions on Parallel and Distributed Systems, Vol. 16, No. 6, pp. 526-537, June 2005. | |
T. Peng, C. Leckie, and K. Ramamohanarao. “Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems.” ACM Computing Surveys, Vol. 39, No. 1, Article 3, April 2007. | |
U. K. Tupakula and V. Varadharajan. ”A controller agent model to counteract DoS attacks in multiple domains”, Proceedings of Integrated Network Management, IFIP/IEEE Eighth International Symposium. pp.113-116, 2003 | |
W. Shi, Y. Xiang and W. Zhou. “Distributed Defense Against Distributed Denial-of-Service Attacks”, Proceedings of ICA3PP 2005, LNCS 3719, pp. 357-362,2005. | |
X. Yang, D. Wetherall, and T. Anderson. “A DoS-limiting network architecture”, Proceedings of ACM SIGCOMM, pp. 241-252, 2005. | |
Mr. Monika Sachdeva
SBSCET, Ferozepur - India
monika.sach37@yahoo.com
Dr. Gurvinder Singh
Guru Nanak Dev University - India
Dr. Kuldip Singh
SBSCET,Ferozepur - India
|
|
|
|
View all special issues >> | |
|
|