Call For Paper Volume:4 Issue:6 Jun'2017

Protecting Network Services against DDoS Attacks

Publication Date : 10/11/2015



Author(s) :

Ms. B. Keerthana, MCA., MPhil., Research Scholar , Mr. C. Muthubharathi., M.Sc., MCA., MPhil., Assistant Professor.


Volume/Issue :
Volume 2
,
Issue 11
(11 - 2015)



Abstract :

Service providers facilitate shared services to execute user required functionalities. Denial of Service (DoS) attacks is raised to disrupt the resources under the service providers. Processor, memory and network bandwidth are violated by the attackers. DoS attacks are initiated by single users. Distributed Denial of Service (DDoS) attacks are initiated by a group of users. It is a complex task to identify the DDoS attacks with minimum loses of network resources. Attacker groups are referenced as botnets in the DDoS attack scenario. Bot master manages the command and control request supply operations within the bots. Simple Mail Transfer Protocol (SMTP) and Internet Relay Chat (IRC) protocols are used to transfer the bot master instructions. Network firewalls control the SMTP and IRC communication for network security reasons. Domain Name Services (DNS) are adapted to distribute the host name and address details. Bot masters use the DNS for command and control messaging process. Exponentially Distributed Query and Piggybacking Query attacks are detected using the markov chain analysis and statistical analysis mechanism. DNS tunneling methods are employed to perform stream based communications. Attack detection latency is increased in the statistical analysis method.   The network service protection scheme is constructed with attack and botnet communication discovery mechanism. Privacy ensured domain name query analysis model is adapted in the security scheme. DDoS attack detection is carried out using anomaly based method. Network traffic and domain query operations are analyzed with Navy bayesian classification technique. Domain Name Service parameters are secured with RSA algorithm. Detection latency is minimized in the attack and communication discovery process.


No. of Downloads :

6


Indexing

Web Design MymensinghPremium WordPress ThemesWeb Development

Protecting Network Services against DDoS Attacks

November 7, 2015