EShield: An effective detection and mitigation of flooding in DDoS attacks over large scale networks

ISSN: 22498958
3Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Distributed Denial-of-Service attacks are very hard to be mitigated in wireless network environment. Here in this manuscript, an effective method of flood detection and mitigation architecture is proposed named eShield, which detects and prevent flooding attacks through spoof detection technique. The proposed method uses an architecture and an algorithm. eShield deals with Intrusion Protection and Detection Systems (IPDS) which collaboratively defend flooding attacks at different points in the network. Here eShield detects the supply node with its port variety which were below assault. Inorder to reduce the burden on international IPDS eShield makes use of distinct nearby IPDS for the assaults in flooding which have been carried out collaboratively. The assessment is done through the widespread simulation of eShield and it is proved to be an actual values based on time delay, false positive rates, computation and communication overhead.

Author supplied keywords

Cite

CITATION STYLE

APA

Selvaraj, J. D. F., Jingle, I. D. J., & Mano Paul, P. (2019). EShield: An effective detection and mitigation of flooding in DDoS attacks over large scale networks. International Journal of Engineering and Advanced Technology, 8(5), 1557–1562.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free