An automatic IP falsifying attacks detection using hop count filtering and round-trip time
this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a lar...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | |
container_title | |
container_volume | 2845 |
creator | Saikumar, K. AL-Hameed, Mazin R. Hamood, Sarah A. Saleh, Saleh Ahmed Hasan Rashed, Ahmed Nabih Zaki Venkat, Vuppalapati Vijaya |
description | this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a large volume of gathered data. Existing research addresses issues such as longer processing times and a lower detection rate for suspicious packets. In this research, we present the Distributed Probability based Hop Count Filtering utilising RTT (DPHCF-RTT) approach to alleviate the above-mentioned constraints by increasing the detection rate of invalid packets and lowering calculation time. As a result, network congestion and the depletion of host resources are no longer issues. Useful information may be gained from Round Trip Time (RTT) in order to enhance an algorithm that depends on Hop Count alone for efficiency. With a maximum of four hops and a minimal computation time, the proposed approach DPHCF-RTT has proved to have a 99 percent detection rate of malicious packets. |
doi_str_mv | 10.1063/5.0157013 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_scitation_primary_10_1063_5_0157013</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2864353355</sourcerecordid><originalsourceid>FETCH-LOGICAL-p133t-5eecde30ca47981b6e8ea1a73da8f1f678936bfc9a0821dd1036f07b6186f17e3</originalsourceid><addsrcrecordid>eNotkE1LAzEYhIMoWKsH_0HAm7A1776bjz2W4kehoAcF8RLSfGhqu7tms4f-e7vW08DwMMMMIdfAZsAE3vEZAy4Z4AmZAOdQSAHilEwYq6uirPD9nFz0_YaxspZSTcjHvKFmyO3O5Gjp8oUGs-1j2Mfmk5qcjf3uqfPZ2xzbhg796H-1HbXt0GQa4jb79Mc2jqaD54qcYkdz3PlLcjaG-at_nZK3h_vXxVOxen5cLuarogPEXHDvrfPIrKlkrWAtvPIGjERnVIAgpKpRrIOtDVMlOAcMRWByLUCJANLjlNwcc7vU_gy-z3rTDqk5VOpSiQo5IucH6vZI9TZmM67RXYo7k_YamB6_01z_f4e_A71hXA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>2864353355</pqid></control><display><type>conference_proceeding</type><title>An automatic IP falsifying attacks detection using hop count filtering and round-trip time</title><source>AIP Journals Complete</source><creator>Saikumar, K. ; AL-Hameed, Mazin R. ; Hamood, Sarah A. ; Saleh, Saleh Ahmed Hasan ; Rashed, Ahmed Nabih Zaki ; Venkat, Vuppalapati Vijaya</creator><contributor>Obaid, Ahmed J. ; Alkhafaji, Mohammed Ayad</contributor><creatorcontrib>Saikumar, K. ; AL-Hameed, Mazin R. ; Hamood, Sarah A. ; Saleh, Saleh Ahmed Hasan ; Rashed, Ahmed Nabih Zaki ; Venkat, Vuppalapati Vijaya ; Obaid, Ahmed J. ; Alkhafaji, Mohammed Ayad</creatorcontrib><description>this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a large volume of gathered data. Existing research addresses issues such as longer processing times and a lower detection rate for suspicious packets. In this research, we present the Distributed Probability based Hop Count Filtering utilising RTT (DPHCF-RTT) approach to alleviate the above-mentioned constraints by increasing the detection rate of invalid packets and lowering calculation time. As a result, network congestion and the depletion of host resources are no longer issues. Useful information may be gained from Round Trip Time (RTT) in order to enhance an algorithm that depends on Hop Count alone for efficiency. With a maximum of four hops and a minimal computation time, the proposed approach DPHCF-RTT has proved to have a 99 percent detection rate of malicious packets.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0157013</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Algorithms ; Denial of service attacks ; Filtration ; IP (Internet Protocol) ; Spoofing</subject><ispartof>AIP conference proceedings, 2023, Vol.2845 (1)</ispartof><rights>Author(s)</rights><rights>2023 Author(s). Published by AIP Publishing.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://pubs.aip.org/acp/article-lookup/doi/10.1063/5.0157013$$EHTML$$P50$$Gscitation$$H</linktohtml><link.rule.ids>309,310,314,776,780,785,786,790,4498,23909,23910,25118,27901,27902,76126</link.rule.ids></links><search><contributor>Obaid, Ahmed J.</contributor><contributor>Alkhafaji, Mohammed Ayad</contributor><creatorcontrib>Saikumar, K.</creatorcontrib><creatorcontrib>AL-Hameed, Mazin R.</creatorcontrib><creatorcontrib>Hamood, Sarah A.</creatorcontrib><creatorcontrib>Saleh, Saleh Ahmed Hasan</creatorcontrib><creatorcontrib>Rashed, Ahmed Nabih Zaki</creatorcontrib><creatorcontrib>Venkat, Vuppalapati Vijaya</creatorcontrib><title>An automatic IP falsifying attacks detection using hop count filtering and round-trip time</title><title>AIP conference proceedings</title><description>this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a large volume of gathered data. Existing research addresses issues such as longer processing times and a lower detection rate for suspicious packets. In this research, we present the Distributed Probability based Hop Count Filtering utilising RTT (DPHCF-RTT) approach to alleviate the above-mentioned constraints by increasing the detection rate of invalid packets and lowering calculation time. As a result, network congestion and the depletion of host resources are no longer issues. Useful information may be gained from Round Trip Time (RTT) in order to enhance an algorithm that depends on Hop Count alone for efficiency. With a maximum of four hops and a minimal computation time, the proposed approach DPHCF-RTT has proved to have a 99 percent detection rate of malicious packets.</description><subject>Algorithms</subject><subject>Denial of service attacks</subject><subject>Filtration</subject><subject>IP (Internet Protocol)</subject><subject>Spoofing</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2023</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotkE1LAzEYhIMoWKsH_0HAm7A1776bjz2W4kehoAcF8RLSfGhqu7tms4f-e7vW08DwMMMMIdfAZsAE3vEZAy4Z4AmZAOdQSAHilEwYq6uirPD9nFz0_YaxspZSTcjHvKFmyO3O5Gjp8oUGs-1j2Mfmk5qcjf3uqfPZ2xzbhg796H-1HbXt0GQa4jb79Mc2jqaD54qcYkdz3PlLcjaG-at_nZK3h_vXxVOxen5cLuarogPEXHDvrfPIrKlkrWAtvPIGjERnVIAgpKpRrIOtDVMlOAcMRWByLUCJANLjlNwcc7vU_gy-z3rTDqk5VOpSiQo5IucH6vZI9TZmM67RXYo7k_YamB6_01z_f4e_A71hXA</recordid><startdate>20230913</startdate><enddate>20230913</enddate><creator>Saikumar, K.</creator><creator>AL-Hameed, Mazin R.</creator><creator>Hamood, Sarah A.</creator><creator>Saleh, Saleh Ahmed Hasan</creator><creator>Rashed, Ahmed Nabih Zaki</creator><creator>Venkat, Vuppalapati Vijaya</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20230913</creationdate><title>An automatic IP falsifying attacks detection using hop count filtering and round-trip time</title><author>Saikumar, K. ; AL-Hameed, Mazin R. ; Hamood, Sarah A. ; Saleh, Saleh Ahmed Hasan ; Rashed, Ahmed Nabih Zaki ; Venkat, Vuppalapati Vijaya</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p133t-5eecde30ca47981b6e8ea1a73da8f1f678936bfc9a0821dd1036f07b6186f17e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Denial of service attacks</topic><topic>Filtration</topic><topic>IP (Internet Protocol)</topic><topic>Spoofing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Saikumar, K.</creatorcontrib><creatorcontrib>AL-Hameed, Mazin R.</creatorcontrib><creatorcontrib>Hamood, Sarah A.</creatorcontrib><creatorcontrib>Saleh, Saleh Ahmed Hasan</creatorcontrib><creatorcontrib>Rashed, Ahmed Nabih Zaki</creatorcontrib><creatorcontrib>Venkat, Vuppalapati Vijaya</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Saikumar, K.</au><au>AL-Hameed, Mazin R.</au><au>Hamood, Sarah A.</au><au>Saleh, Saleh Ahmed Hasan</au><au>Rashed, Ahmed Nabih Zaki</au><au>Venkat, Vuppalapati Vijaya</au><au>Obaid, Ahmed J.</au><au>Alkhafaji, Mohammed Ayad</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An automatic IP falsifying attacks detection using hop count filtering and round-trip time</atitle><btitle>AIP conference proceedings</btitle><date>2023-09-13</date><risdate>2023</risdate><volume>2845</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>this kind of DoS attack depends on numerous compromised hosts in the network to assault the victim, which results in a significant decrease in the victim's performance. In most DDoS attack tools, IP spoofing technique is used, which makes it impossible to filter out erroneous packets from a large volume of gathered data. Existing research addresses issues such as longer processing times and a lower detection rate for suspicious packets. In this research, we present the Distributed Probability based Hop Count Filtering utilising RTT (DPHCF-RTT) approach to alleviate the above-mentioned constraints by increasing the detection rate of invalid packets and lowering calculation time. As a result, network congestion and the depletion of host resources are no longer issues. Useful information may be gained from Round Trip Time (RTT) in order to enhance an algorithm that depends on Hop Count alone for efficiency. With a maximum of four hops and a minimal computation time, the proposed approach DPHCF-RTT has proved to have a 99 percent detection rate of malicious packets.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0157013</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0094-243X |
ispartof | AIP conference proceedings, 2023, Vol.2845 (1) |
issn | 0094-243X 1551-7616 |
language | eng |
recordid | cdi_scitation_primary_10_1063_5_0157013 |
source | AIP Journals Complete |
subjects | Algorithms Denial of service attacks Filtration IP (Internet Protocol) Spoofing |
title | An automatic IP falsifying attacks detection using hop count filtering and round-trip time |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T22%3A57%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20automatic%20IP%20falsifying%20attacks%20detection%20using%20hop%20count%20filtering%20and%20round-trip%20time&rft.btitle=AIP%20conference%20proceedings&rft.au=Saikumar,%20K.&rft.date=2023-09-13&rft.volume=2845&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0157013&rft_dat=%3Cproquest_scita%3E2864353355%3C/proquest_scita%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2864353355&rft_id=info:pmid/&rfr_iscdi=true |