Dynamic PID based approach for preventing DDOS attack in IP network
DOI:
https://doi.org/10.26438/ijcse/v7i6.512517Keywords:
DDOS, Static PID, Zombies, Dynamic PIDAbstract
One of the most common attack known as DDOS(distributed denial-of-service) attack are threat to the net. In DDOS attack the intruder makes use of scattered zombies in order to transfer a huge quantity of traffic to the targeted host, so that the legal users will not be able to access the network services or resources. The main cause for this attack to happen is the use of static PID’s, as this static PID’s remain constant throughout the session the intruder can easily trap these PID’s used and launch the DDOS attack. In order to overcome this problem, here in this project work we plan, estimate and evaluate the use of dynamic PID. Here we make use of 16 characters pseudorandom dynamic PID’s . In dynamic mode these PID’s keep on changing throughout the session , this makes hard for the intruders to track the PID’s and launch the attack.
References
[1]. Yang Xiang, Ke Li, and Wanlei Zhou, Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 2, JUNE 2011.
[2]. Vijayalakshmi, Shalinie, Arun Pragash, IP Traceback System for Network and Application Layer Attacks, Recent Trends In Information Technology (ICRTIT), 2012 International Conference
[3]. Ahmad Sanmorino1, Setiadi Yazid2, DDoS Attack detection method and mitigation using pattern of the flow,2013 International conference of Information and communication technology(ICoICT)
[4]. Muhammad Aamir , Muhammad Arif, Study and Performance Evaluation on Recent DDoS Trends ofAttack & Defense, I.J. Information Technology and Computer Science, 2013, 08, 54-65
[5]. PyungKoo Park, SeongMin Yoo, Chungnam Nat, Service-Oriented DDoS Detection Mechanism Using Pseudo State in a Flow Router , 2013 International Conference on Information Science and Applications (ICISA)
[6]. Saman Taghavi Zargar, Joshi, Member, IEEE, and David Tipper,A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, ACCEPTED FOR PUBLICATION (2013)
[7]. Ilker Ozcelik, Yu Fu , Richard R. Brooks ,DoS Detection is Easier Now, 2013 Second GENI Research and Educational Experiment Workshop.
[8].Monowar H. Bhuyan1, H. J. Kashyap1,D. K.Bhattacharyya, Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions, The Computer Journal first published online March 28, 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
