An automatic IP falsifying attacks detection using hop count filtering and round-trip time
this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a lar...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a large volume of gathered data. Existing research addresses issues such as longer processing times and a lower detection rate for suspicious packets. In this research, we present the Distributed Probability based Hop Count Filtering utilising RTT (DPHCF-RTT) approach to alleviate the above-mentioned constraints by increasing the detection rate of invalid packets and lowering calculation time. As a result, network congestion and the depletion of host resources are no longer issues. Useful information may be gained from Round Trip Time (RTT) in order to enhance an algorithm that depends on Hop Count alone for efficiency. With a maximum of four hops and a minimal computation time, the proposed approach DPHCF-RTT has proved to have a 99 percent detection rate of malicious packets. |
---|---|
ISSN: | 0094-243X 1551-7616 |
DOI: | 10.1063/5.0157013 |