Skip to main content

2024 | OriginalPaper | Buchkapitel

Assessment of a Semi-supervised Machine Learning Method for Thwarting Network DDoS Assaults

verfasst von : Somarowthu Gani Lakshmi, Tutta Naga Venkata Durga, P. Srilatha, C. H. D. V. P. Kumari, E. Laxmi Lydia, Elvir Akhmetshin

Erschienen in: Evolution in Signal Processing and Telecommunication Networks

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In latest existence, Path identifiers (PID) have utilised as inter-domain routing (IDR) things in association. Though, the PIDs utilised in present methods are immobile that creates it simple for attacker to introduce D DoS flooding attacks. To discourse this problem, current a D-PID structure, which make use of PIDs negotiated among neighbouring domains as IDR substance. The PID of the inter-domain connection between two domains in DPID is going to be kept private and can vary periodically. Cryptographic techniques may be employed as well to safeguard the security of information shared over a network. There is a good possibility that DPID’s data-secure technique will stop networking D DoS assaults.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Godfrey PB, Ganichev I, Shenker S, Stoica I (2009) Pathlet routing. In: Proceedings of SIGCOMM’09, Aug 2009 Godfrey PB, Ganichev I, Shenker S, Stoica I (2009) Pathlet routing. In: Proceedings of SIGCOMM’09, Aug 2009
2.
Zurück zum Zitat Jokela P, Zahemszky A, Esteve Rothenberg C, Arianfar S, Nikander P (2009) LIPSIN: line speed publish/subscribe inter- networking. In: Proceedings of SIGCOMM’09, Aug. 2009 Jokela P, Zahemszky A, Esteve Rothenberg C, Arianfar S, Nikander P (2009) LIPSIN: line speed publish/subscribe inter- networking. In: Proceedings of SIGCOMM’09, Aug. 2009
3.
Zurück zum Zitat Koponen T, Chawla M, Chun BG, Ermolinskiy A, Kim KH, Shenker S, Stoica I (2007) A data-oriented (and beyond) network architecture. In: Proceedings of SIGCOMM’07, Aug. 2007 Koponen T, Chawla M, Chun BG, Ermolinskiy A, Kim KH, Shenker S, Stoica I (2007) A data-oriented (and beyond) network architecture. In: Proceedings of SIGCOMM’07, Aug. 2007
4.
Zurück zum Zitat Luo H, Chen Z, Cui J, Zhang H, Zukerman M, Qiao C (2014) CoLoR: an information Centric internet architecture for innovations. IEEE Network Luo H, Chen Z, Cui J, Zhang H, Zukerman M, Qiao C (2014) CoLoR: an information Centric internet architecture for innovations. IEEE Network
5.
Zurück zum Zitat Luo H, Chen Z, Li J, Vasilakos AV (2017) Preventing distributed denial-of-service flooding attacks with dynamic path identifiers. IEEE Trans Inf Forensics Secur 2017 Luo H, Chen Z, Li J, Vasilakos AV (2017) Preventing distributed denial-of-service flooding attacks with dynamic path identifiers. IEEE Trans Inf Forensics Secur 2017
6.
Zurück zum Zitat Liu X, Yang X, Lu Y (2008) To filter or to authorize: network-layer DoS defenseagainst multimillion-node botnets. In: Proceedings on SIGCOMM’ 08, Aug. 2008 Liu X, Yang X, Lu Y (2008) To filter or to authorize: network-layer DoS defenseagainst multimillion-node botnets. In: Proceedings on SIGCOMM’ 08, Aug. 2008
7.
Zurück zum Zitat S. T. Zargar, J. Joshi, D. Tipper “A Survey of Defense Mechanisms Against system Distributed Denial of Service (DDoS) Flooding Attacks,” IEEE Commun.Surv&Tut. Nov. 2013 S. T. Zargar, J. Joshi, D. Tipper “A Survey of Defense Mechanisms Against system Distributed Denial of Service (DDoS) Flooding Attacks,” IEEE Commun.Surv&Tut. Nov. 2013
8.
Zurück zum Zitat Ferguson P, Senie D (2000) Network ingress filtering: defeating denial of service of attacks that employ IP source address spoofing. IETF Internet RFC 2827, May 2000 Ferguson P, Senie D (2000) Network ingress filtering: defeating denial of service of attacks that employ IP source address spoofing. IETF Internet RFC 2827, May 2000
9.
Zurück zum Zitat Park K, Lee H (2001) On the effectiveness of route-based packet filtering for the distributed DoS attack prevention in powerlaw internets, Aug. 2001 Park K, Lee H (2001) On the effectiveness of route-based packet filtering for the distributed DoS attack prevention in powerlaw internets, Aug. 2001
10.
Zurück zum Zitat A. Yaar, A. Perrig, D. Song, “StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense,” IEEE J. on Sel. Areas in Commun., Oct. 2006 A. Yaar, A. Perrig, D. Song, “StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense,” IEEE J. on Sel. Areas in Commun., Oct. 2006
11.
Zurück zum Zitat Wang H, Jin C, Shin KG (2007) Defense against spoofed IP traffic using hop-count filtering, IEEE/ACM Trans Netw 2007 Wang H, Jin C, Shin KG (2007) Defense against spoofed IP traffic using hop-count filtering, IEEE/ACM Trans Netw 2007
12.
Zurück zum Zitat Duan Z, Yuan X, Chandrashekar J (2008) Controlling IP spoofing through inter domain packet filters. IEEE Trans Depend Secure Comput 2008 Duan Z, Yuan X, Chandrashekar J (2008) Controlling IP spoofing through inter domain packet filters. IEEE Trans Depend Secure Comput 2008
13.
Zurück zum Zitat Savage S, Wetherall D, Karlin A, Anderson T (2000) Practical network support for IP traceback. In: Proceedings on Aug. 2000, Stockholm, Sweden Savage S, Wetherall D, Karlin A, Anderson T (2000) Practical network support for IP traceback. In: Proceedings on Aug. 2000, Stockholm, Sweden
14.
Zurück zum Zitat Han S-J (1996) The improved data encryption standard (DES) algorithm. IEEE Han S-J (1996) The improved data encryption standard (DES) algorithm. IEEE
15.
Zurück zum Zitat Beamer S, Patterson D (2012) Direction-optimizing breadth-first search. In: IEEE conference Beamer S, Patterson D (2012) Direction-optimizing breadth-first search. In: IEEE conference
Metadaten
Titel
Assessment of a Semi-supervised Machine Learning Method for Thwarting Network DDoS Assaults
verfasst von
Somarowthu Gani Lakshmi
Tutta Naga Venkata Durga
P. Srilatha
C. H. D. V. P. Kumari
E. Laxmi Lydia
Elvir Akhmetshin
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0644-0_28

Neuer Inhalt