Prevention of DrDoS Amplification Attacks by Penalizing the Attackers in SDN Environment

5Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Distributed Denial of Service (DDoS) attacks is one of the most prevalent and dangerous cyber-attacks that can bring down the targeted part of Internet infrastructure in a short amount of time, thus resulting in significant economic losses. As a defense strategy against these attacks, attack detection followed by attack mitigation is not enough as there will always be a time lag between detection and mitigation. Instead, attack prevention is a more promising strategy. This paper focuses on preventing such attacks that save the targeted (or victim’s) network from any harm and penalize the attacker’s network for making the attack. We propose two DDoS prevention techniques named Port-Mapping, and PortMergeIP, considering DNS amplification attack as a specific and one of the most dangerous types of DDoS attack. All the methods are proven to prevent the victim from the attack altogether. The packet loss is up to 98% at the attacker’s side when the proposed algorithm is implemented during a DDoS attack. The delay introduced due to the proposed algorithms is approximately 30% lesser than an existing work based on authentication.

Cite

CITATION STYLE

APA

Saharan, S., & Gupta, V. (2022). Prevention of DrDoS Amplification Attacks by Penalizing the Attackers in SDN Environment. In Lecture Notes in Networks and Systems (Vol. 450 LNNS, pp. 684–696). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-99587-4_58

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free