122
Views
3
CrossRef citations to date
0
Altmetric
Review Articles

A Complete Detection and Mitigation Framework to Protect a Network from DDoS Attacks

&
 

Abstract

In this paper we present a complete framework for detection and mitigation of different types of commonly seen deadly DDoS attacks. The system assumes bi-directional traffic information at an edge router to detect and mitigate the attacks. A router might not always see the outgoing traffic corresponding to the incoming traffic carried by the router and which has always been a problem for other approaches which assume bi-directionality of the traffic in the monitoring point. We introduce an agent-based technique which enables each edge router to validate the bi-directional nature of effectiveness of our detection and mitigation the incoming traffic passing through them. We present several experiments demonstrating the system. Also, we introduce a packet marking scheme called as XORID, which can be used to defend against spoofing based DDoS attacks.

Additional information

Notes on contributors

Ram Charan Baishya

Ram Charan Baishya is a PhD student in the Department of Computer Science and Engineering at Tezpur University. His area of research includes network security and machine learning.E-mail: [email protected]

D. K. Bhattacharyya

Dhruba Kr Bhattacharyya received his PhD in computer science from Tezpur University in 1999. He is a professor in the Computer Science & Engineering Department at Tezpur University. His research areas include data mining,network security and content based image retrieval. Prof Bhattacharyya has published 220+ research papers in the leading international journals and conference proceedings. In addition, Dr Bhattacharyya has written/edited 10 books. He is a Programme Committee/Advisory Body member of several international conferences/ workshops. Corresponding author. E-mail: [email protected].

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.