DDoS Attack Defense against Source IP Address Spoofing Attacks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 156 , Downloads: 131 | CTR: 84 % | Weekly Popularity: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

DDoS Attack Defense against Source IP Address Spoofing Attacks

Archana S. Pimpalkar, Prof. A. R. Bhagat Patil

Distributed Denial of Service (DDoS) attacks is the most challenging problems for network security. The attacker uses large number of compromised hosts to launch attack on victim. Various DDoS defense mechanisms aim at detecting and preventing the attack traffic. Source IP address spoofing is one of the most common ways of launching Distributed Denial of Service attacks. In these types of attacks, attack packets true origin is difficult to identify. Thus, it is very challenging to detect attack packets and handle defense mechanisms against such attacks. In this paper, defense mechanism uses cryptographic technique for identifying attack packets with source IP address spoofing and dropping those attack packets. This mechanism does not require restrictions or changes to internet routing protocols and is easy to deploy. The algorithm is efficient in identifying spoof attack packets and its effectiveness is evaluated by simulation experiments in NS3.

Keywords: DDoS attacks, spoofing, detection, defense, cryptography, packet filtering

Edition: Volume 4 Issue 3, March 2015

Pages: 1776 - 1781

Share this Article

How to Cite this Article?

Archana S. Pimpalkar, Prof. A. R. Bhagat Patil, "DDoS Attack Defense against Source IP Address Spoofing Attacks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152513, Volume 4 Issue 3, March 2015, 1776 - 1781

156 PDF Views | 131 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'DDoS attacks'

Views: 120 , Downloads: 98 | CTR: 82 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Views: 138 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Views: 138 , Downloads: 102 | CTR: 74 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1368 - 1371

Spam and Zombie Detection System with Machine Learned Spot Algorithm

Manishankar.S, Sobin E. S

Share this Article

Views: 131 , Downloads: 102 | CTR: 78 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1747 - 1751

Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud

Aaqib Iqbal Wani, Janaki Raman V., N. Priya

Share this Article

Views: 157 , Downloads: 106 | CTR: 68 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

Similar Articles with Keyword 'spoofing'

Views: 135 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Views: 129 , Downloads: 102 | CTR: 79 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Views: 168 , Downloads: 106 | CTR: 63 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Views: 121 , Downloads: 108 | CTR: 89 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2694 - 2699

Antispoofing Methods for Authenticating Live Users in Biometric System

Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal

Share this Article

Views: 128 , Downloads: 108 | CTR: 84 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this Article

Similar Articles with Keyword 'detection'

Views: 35 , Downloads: 27 | CTR: 77 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1179 - 1182

Face Detection Using Haar Cascade Classifiers

Bhavana R. Maale, Dr. Suvarna Nandyal

Share this Article

Views: 41 , Downloads: 28 | CTR: 68 % | Weekly Popularity: ⮙10

Research Paper, Computer Science & Engineering, Syria, Volume 10 Issue 3, March 2021

Pages: 524 - 528

Detection and Classification of Skin Cancer using Image Processing Techniques

Maha Shawish, Balsam Eid

Share this Article

Views: 34 , Downloads: 31 | CTR: 91 % | Weekly Popularity: ⮙7

Student Project, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1677 - 1680

Detecting Pneumonia from X-Ray Images using Deep Learning

Deep Piyushkumar Patel

Share this Article

Views: 47 , Downloads: 40 | CTR: 85 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Views: 51 , Downloads: 40 | CTR: 78 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2623 - 2629

Object Detection and Pose Tracking In Augmented Reality

Vipul P.Chauhan, Dr. Manish M. Kayasth

Share this Article

Similar Articles with Keyword 'defense'

Views: 47 , Downloads: 40 | CTR: 85 %

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Views: 134 , Downloads: 98 | CTR: 73 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 878 - 881

Detection of Malicious Client based HTTP/DoS Attack on Web Server

Dhanya Jayan, Pretty Babu

Share this Article

Views: 120 , Downloads: 98 | CTR: 82 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Views: 131 , Downloads: 99 | CTR: 76 %

Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016

Pages: 1112 - 1116

Network Security Mechanism Based On Static Internet Protocol Addressing

Ahmed D. Asad

Share this Article

Views: 163 , Downloads: 100 | CTR: 61 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1450 - 1456

An Aerial View of Hierarchical Energy Efficient Protocols in Wireless Body Sensor Networks

M. Devapriya, R. Sudha

Share this Article

Similar Articles with Keyword 'cryptography'

Views: 157 , Downloads: 88 | CTR: 56 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Views: 165 , Downloads: 91 | CTR: 55 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Views: 139 , Downloads: 98 | CTR: 71 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Views: 138 , Downloads: 100 | CTR: 72 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Similar Articles with Keyword 'packet filtering'

Views: 120 , Downloads: 98 | CTR: 82 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this Article

Views: 132 , Downloads: 106 | CTR: 80 % | Weekly Popularity: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1982 - 1985

Review: Firewall Privacy Preservation By Packet Filtering Management

Akshay Dattatray Kachare, Geeta Atkar

Share this Article

Views: 141 , Downloads: 112 | CTR: 79 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1583 - 1590

Paper on Types of Firewall and Design Principles

Vidthya Redya, Dr. K. Shahu Chatrapati, Dr. V. N. Kamalesh

Share this Article

Views: 141 , Downloads: 119 | CTR: 84 % | Weekly Popularity: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1733 - 1735

Common Gateway Interface

Kamal Kathuria, Chaynika Kapoor, Apoorva Adlakha

Share this Article
Top