Detection of Denial of Service Attack on Data Network Using IP Traceback with Entropy Variation
Author(s):
Dr.N.Arumugam
Keywords:
DoS attacks, IP trace back, hop count, pheromone intensity, flow level
Abstract
In internet data packets are typically routed through different networks until it gets to reach its destination. In the present state of affairs maximum numbers of day to day activities are performed through online using internet. As the easy accessibility of internet anybody share any information to anyone without any prerequisite. The design architecture of internet do not performs any security verification of the originality of each data packets. The lack of such verification opens the door for a variety of network security vulnerabilities like denial-of-service (DoS) attacks, man-in-the-middle attacks etc. One of the major threats to the Internet is DoS attack which is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service include attempts to flood a network, thereby preventing legitimate network traffic .It attempts to disrupt connections between two machines, thereby preventing access to a service either to prevent a particular individual from accessing a service or to disrupt service to a specific system. A number of detection techniques are proposed by the research community to detect the origin of the attack. This article proposed a traceback based technique is used to identify the attack origin.
Article Details
Unique Paper ID: 147057
Publication Volume & Issue: Volume 1, Issue 12
Page(s): 1688 - 1692
Article Preview & Download
Share This Article
Conference Alert
NCSST-2021
AICTE Sponsored National Conference on Smart Systems and Technologies
Last Date: 25th November 2021
SWEC- Management
LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT