Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/12089
Issue Date: 2009
Abstract: Distributed Denial of Service (DDoS) attacks pose a severe security threat to the steady functioning of any network. These attacks aim at depleting the resources of a server or an administrative network by overwhelming it with enormous and useless traffic. The outcome of this is the fact that legitimate users are denied service. Though a large number of schemes have been proposed and implemented for defense against the DDoS attacks, an end-to-end approach for the same is still missing. Great amount of research has been carried out in the areas of the detection of the presence of these attacks, differentiating the legitimate flows from the attack ones, tracing the identity of the attackers and fortifying the server in order to minimize the impact of the attack. But there is still a paucity of effective frameworks that encompass multiple stages of the process of defense against DoS attacks. In this work "A NOVEL MITIGATION AND TRACEBACK SCHEME FOR DDoS ATTACK ", a novel solution is. proposed which deals with mitigating the influence of the attack, and identification of the path traversed by the flow once it has been characterized as an attack flow. In the proposed strategy, the packets are marked a hash of the router in there identification field. The TTL field is used to calculate the distance from the marked router to the Victim. These packets are subjected to characterization module and if attack is diagnosed the modified pushback as well as the traceback to the attacker starts. Pushback gives the immediate relief to the Victim as well as gives time to trace the attacker. The effectiveness of the approach is validated with simulation in ns-2 on a Linux platform. iii
Other Identifiers: M.Tech
Research Supervisor/ Guide: Joshi, R. C.
metadata.dc.type: M.Tech Dessertation
Appears in Collections:MASTERS' DISSERTATIONS (E & C)

Files in This Item:
File Description SizeFormat 
ECDG14633.pdf5.3 MBAdobe PDFView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.