An automatic IP falsifying attacks detection using hop count filtering and round-trip time

this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a lar...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Saikumar, K., AL-Hameed, Mazin R., Hamood, Sarah A., Saleh, Saleh Ahmed Hasan, Rashed, Ahmed Nabih Zaki, Venkat, Vuppalapati Vijaya
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page
container_title
container_volume 2845
creator Saikumar, K.
AL-Hameed, Mazin R.
Hamood, Sarah A.
Saleh, Saleh Ahmed Hasan
Rashed, Ahmed Nabih Zaki
Venkat, Vuppalapati Vijaya
description this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a large volume of gathered data. Existing research addresses issues such as longer processing times and a lower detection rate for suspicious packets. In this research, we present the Distributed Probability based Hop Count Filtering utilising RTT (DPHCF-RTT) approach to alleviate the above-mentioned constraints by increasing the detection rate of invalid packets and lowering calculation time. As a result, network congestion and the depletion of host resources are no longer issues. Useful information may be gained from Round Trip Time (RTT) in order to enhance an algorithm that depends on Hop Count alone for efficiency. With a maximum of four hops and a minimal computation time, the proposed approach DPHCF-RTT has proved to have a 99 percent detection rate of malicious packets.
doi_str_mv 10.1063/5.0157013
format Conference Proceeding
fullrecord <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_scitation_primary_10_1063_5_0157013</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2864353355</sourcerecordid><originalsourceid>FETCH-LOGICAL-p133t-5eecde30ca47981b6e8ea1a73da8f1f678936bfc9a0821dd1036f07b6186f17e3</originalsourceid><addsrcrecordid>eNotkE1LAzEYhIMoWKsH_0HAm7A1776bjz2W4kehoAcF8RLSfGhqu7tms4f-e7vW08DwMMMMIdfAZsAE3vEZAy4Z4AmZAOdQSAHilEwYq6uirPD9nFz0_YaxspZSTcjHvKFmyO3O5Gjp8oUGs-1j2Mfmk5qcjf3uqfPZ2xzbhg796H-1HbXt0GQa4jb79Mc2jqaD54qcYkdz3PlLcjaG-at_nZK3h_vXxVOxen5cLuarogPEXHDvrfPIrKlkrWAtvPIGjERnVIAgpKpRrIOtDVMlOAcMRWByLUCJANLjlNwcc7vU_gy-z3rTDqk5VOpSiQo5IucH6vZI9TZmM67RXYo7k_YamB6_01z_f4e_A71hXA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>2864353355</pqid></control><display><type>conference_proceeding</type><title>An automatic IP falsifying attacks detection using hop count filtering and round-trip time</title><source>AIP Journals Complete</source><creator>Saikumar, K. ; AL-Hameed, Mazin R. ; Hamood, Sarah A. ; Saleh, Saleh Ahmed Hasan ; Rashed, Ahmed Nabih Zaki ; Venkat, Vuppalapati Vijaya</creator><contributor>Obaid, Ahmed J. ; Alkhafaji, Mohammed Ayad</contributor><creatorcontrib>Saikumar, K. ; AL-Hameed, Mazin R. ; Hamood, Sarah A. ; Saleh, Saleh Ahmed Hasan ; Rashed, Ahmed Nabih Zaki ; Venkat, Vuppalapati Vijaya ; Obaid, Ahmed J. ; Alkhafaji, Mohammed Ayad</creatorcontrib><description>this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a large volume of gathered data. Existing research addresses issues such as longer processing times and a lower detection rate for suspicious packets. In this research, we present the Distributed Probability based Hop Count Filtering utilising RTT (DPHCF-RTT) approach to alleviate the above-mentioned constraints by increasing the detection rate of invalid packets and lowering calculation time. As a result, network congestion and the depletion of host resources are no longer issues. Useful information may be gained from Round Trip Time (RTT) in order to enhance an algorithm that depends on Hop Count alone for efficiency. With a maximum of four hops and a minimal computation time, the proposed approach DPHCF-RTT has proved to have a 99 percent detection rate of malicious packets.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0157013</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Algorithms ; Denial of service attacks ; Filtration ; IP (Internet Protocol) ; Spoofing</subject><ispartof>AIP conference proceedings, 2023, Vol.2845 (1)</ispartof><rights>Author(s)</rights><rights>2023 Author(s). Published by AIP Publishing.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://pubs.aip.org/acp/article-lookup/doi/10.1063/5.0157013$$EHTML$$P50$$Gscitation$$H</linktohtml><link.rule.ids>309,310,314,776,780,785,786,790,4498,23909,23910,25118,27901,27902,76126</link.rule.ids></links><search><contributor>Obaid, Ahmed J.</contributor><contributor>Alkhafaji, Mohammed Ayad</contributor><creatorcontrib>Saikumar, K.</creatorcontrib><creatorcontrib>AL-Hameed, Mazin R.</creatorcontrib><creatorcontrib>Hamood, Sarah A.</creatorcontrib><creatorcontrib>Saleh, Saleh Ahmed Hasan</creatorcontrib><creatorcontrib>Rashed, Ahmed Nabih Zaki</creatorcontrib><creatorcontrib>Venkat, Vuppalapati Vijaya</creatorcontrib><title>An automatic IP falsifying attacks detection using hop count filtering and round-trip time</title><title>AIP conference proceedings</title><description>this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a large volume of gathered data. Existing research addresses issues such as longer processing times and a lower detection rate for suspicious packets. In this research, we present the Distributed Probability based Hop Count Filtering utilising RTT (DPHCF-RTT) approach to alleviate the above-mentioned constraints by increasing the detection rate of invalid packets and lowering calculation time. As a result, network congestion and the depletion of host resources are no longer issues. Useful information may be gained from Round Trip Time (RTT) in order to enhance an algorithm that depends on Hop Count alone for efficiency. With a maximum of four hops and a minimal computation time, the proposed approach DPHCF-RTT has proved to have a 99 percent detection rate of malicious packets.</description><subject>Algorithms</subject><subject>Denial of service attacks</subject><subject>Filtration</subject><subject>IP (Internet Protocol)</subject><subject>Spoofing</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2023</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotkE1LAzEYhIMoWKsH_0HAm7A1776bjz2W4kehoAcF8RLSfGhqu7tms4f-e7vW08DwMMMMIdfAZsAE3vEZAy4Z4AmZAOdQSAHilEwYq6uirPD9nFz0_YaxspZSTcjHvKFmyO3O5Gjp8oUGs-1j2Mfmk5qcjf3uqfPZ2xzbhg796H-1HbXt0GQa4jb79Mc2jqaD54qcYkdz3PlLcjaG-at_nZK3h_vXxVOxen5cLuarogPEXHDvrfPIrKlkrWAtvPIGjERnVIAgpKpRrIOtDVMlOAcMRWByLUCJANLjlNwcc7vU_gy-z3rTDqk5VOpSiQo5IucH6vZI9TZmM67RXYo7k_YamB6_01z_f4e_A71hXA</recordid><startdate>20230913</startdate><enddate>20230913</enddate><creator>Saikumar, K.</creator><creator>AL-Hameed, Mazin R.</creator><creator>Hamood, Sarah A.</creator><creator>Saleh, Saleh Ahmed Hasan</creator><creator>Rashed, Ahmed Nabih Zaki</creator><creator>Venkat, Vuppalapati Vijaya</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20230913</creationdate><title>An automatic IP falsifying attacks detection using hop count filtering and round-trip time</title><author>Saikumar, K. ; AL-Hameed, Mazin R. ; Hamood, Sarah A. ; Saleh, Saleh Ahmed Hasan ; Rashed, Ahmed Nabih Zaki ; Venkat, Vuppalapati Vijaya</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p133t-5eecde30ca47981b6e8ea1a73da8f1f678936bfc9a0821dd1036f07b6186f17e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Denial of service attacks</topic><topic>Filtration</topic><topic>IP (Internet Protocol)</topic><topic>Spoofing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Saikumar, K.</creatorcontrib><creatorcontrib>AL-Hameed, Mazin R.</creatorcontrib><creatorcontrib>Hamood, Sarah A.</creatorcontrib><creatorcontrib>Saleh, Saleh Ahmed Hasan</creatorcontrib><creatorcontrib>Rashed, Ahmed Nabih Zaki</creatorcontrib><creatorcontrib>Venkat, Vuppalapati Vijaya</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Saikumar, K.</au><au>AL-Hameed, Mazin R.</au><au>Hamood, Sarah A.</au><au>Saleh, Saleh Ahmed Hasan</au><au>Rashed, Ahmed Nabih Zaki</au><au>Venkat, Vuppalapati Vijaya</au><au>Obaid, Ahmed J.</au><au>Alkhafaji, Mohammed Ayad</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An automatic IP falsifying attacks detection using hop count filtering and round-trip time</atitle><btitle>AIP conference proceedings</btitle><date>2023-09-13</date><risdate>2023</risdate><volume>2845</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a large volume of gathered data. Existing research addresses issues such as longer processing times and a lower detection rate for suspicious packets. In this research, we present the Distributed Probability based Hop Count Filtering utilising RTT (DPHCF-RTT) approach to alleviate the above-mentioned constraints by increasing the detection rate of invalid packets and lowering calculation time. As a result, network congestion and the depletion of host resources are no longer issues. Useful information may be gained from Round Trip Time (RTT) in order to enhance an algorithm that depends on Hop Count alone for efficiency. With a maximum of four hops and a minimal computation time, the proposed approach DPHCF-RTT has proved to have a 99 percent detection rate of malicious packets.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0157013</doi><tpages>7</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0094-243X
ispartof AIP conference proceedings, 2023, Vol.2845 (1)
issn 0094-243X
1551-7616
language eng
recordid cdi_scitation_primary_10_1063_5_0157013
source AIP Journals Complete
subjects Algorithms
Denial of service attacks
Filtration
IP (Internet Protocol)
Spoofing
title An automatic IP falsifying attacks detection using hop count filtering and round-trip time
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T22%3A57%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20automatic%20IP%20falsifying%20attacks%20detection%20using%20hop%20count%20filtering%20and%20round-trip%20time&rft.btitle=AIP%20conference%20proceedings&rft.au=Saikumar,%20K.&rft.date=2023-09-13&rft.volume=2845&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0157013&rft_dat=%3Cproquest_scita%3E2864353355%3C/proquest_scita%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2864353355&rft_id=info:pmid/&rfr_iscdi=true