Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack
作者机构:Department of Computer Science and EngineeringSri Sivasubramaniya Nadar College of EngineeringKalavakkamChennaiTamil Nadu603110India
出 版 物:《Computer Systems Science & Engineering》 (计算机系统科学与工程(英文))
年 卷 期:2023年第44卷第1期
页 面:67-79页
核心收录:
学科分类:12[管理学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)]
主 题:Flooding spoofing cooperative solution multilevel security filtering pushback
摘 要:The exponential advancement in telecommunication embeds the Internet in every aspect of *** of networks all over the world impose monumental risks on the Internet.A Flooding Attack(FA)is one of the major intimidating risks on the Internet where legitimate users are prevented from accessing network *** of the protective measures incorporated in the communication infrastructure,FA still persists due to the lack of global *** of the existing mitigation is set up either at the traffic starting point or at the traffic ending *** mitigation at one or the other end may not be a complete *** insist on better protection againstflooding attacks,this work proposes a cooperative multilevel defense *** proposed cooperative multilevel defense mechanism consists of two-level of *** thefirst level,it is proposed to design a Threshold-based rate-limiting with a Spoofing Resistant Tag(TSRT),as a source end countermeasure for High-Rate Flooding Attacks(HRFA)and spoofing *** the second level,the accent is to discriminate normal traffic after Distributed Denial of Service(DDoS)traffic and drop the DDoS traffic at the destination *** Congruence-based Selective Pushback(FCSP),as a destination-initiated countermeasure for the Low Rate Flooding Attack(LRFA).The source and the destination cooperate to identify and block the attack.A key advantage of this cooperative mechanism is that it can distinguish and channel down the attack traffic nearer to the starting point of the *** presentation of the agreeable cooperative multilevel safeguard mechanism is approved through broad recreation in *** investigation and the exploratory outcomes show that the proposed plan can effectively identify and shield from the attack.