An automatic IP falsifying attacks detection using hop count filtering and round-trip time

this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a lar...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Saikumar, K., AL-Hameed, Mazin R., Hamood, Sarah A., Saleh, Saleh Ahmed Hasan, Rashed, Ahmed Nabih Zaki, Venkat, Vuppalapati Vijaya
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a large volume of gathered data. Existing research addresses issues such as longer processing times and a lower detection rate for suspicious packets. In this research, we present the Distributed Probability based Hop Count Filtering utilising RTT (DPHCF-RTT) approach to alleviate the above-mentioned constraints by increasing the detection rate of invalid packets and lowering calculation time. As a result, network congestion and the depletion of host resources are no longer issues. Useful information may be gained from Round Trip Time (RTT) in order to enhance an algorithm that depends on Hop Count alone for efficiency. With a maximum of four hops and a minimal computation time, the proposed approach DPHCF-RTT has proved to have a 99 percent detection rate of malicious packets.
ISSN:0094-243X
1551-7616
DOI:10.1063/5.0157013