Loading…
CoDe - An collaborative detection algorithm for DDoS attacks
Security threats for the network services have been constantly increasing day by day. Distributed denial of service (DDoS) attack is one such kind of security threat which involves multiple systems generating a large amount of traffic towards a target machine and thereby making any service from that...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 118 |
container_issue | |
container_start_page | 113 |
container_title | |
container_volume | |
creator | Shalinie, S. M. Kumar, M. P. M. Karthikeyan, M. Sajani, J. D. Nachammai, V. A. Sundarakantham, K. Mallikarjunan, K. N. |
description | Security threats for the network services have been constantly increasing day by day. Distributed denial of service (DDoS) attack is one such kind of security threat which involves multiple systems generating a large amount of traffic towards a target machine and thereby making any service from that target machine or server unavailable to its clients. This threat by nature needs no control over the target system. Traditional methods of detecting DDoS attacks are mostly centralized in nature and highly disadvantageous. To overcome the disadvantages of those schemes, we propose a distributed methodology which involves installing the attack detectors at various parts of the network. Each router in the network will monitor the traffic flowing through it and if any anomaly in the traffic pattern is detected, it will raise an alarm to the nearby routers. The alarm propagates to all the routers through which the attack flows. By this way a tree like construct is made, which will have information about number of alarms raised and the path of the attack flow. If the construct shows any converging pattern then it is declared as DDoS attack. |
doi_str_mv | 10.1109/ICRTIT.2011.5972338 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5972338</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5972338</ieee_id><sourcerecordid>5972338</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-b8b15d878f2efa62ac2bfa81b501a81719cf8f47d012acb784d7dfb31d854aa33</originalsourceid><addsrcrecordid>eNo1j81KxDAUhSMiqGOfYDZ5gdbcpGkScDO0_hQGBO1-uGkSjXYm0gbBt3fA8Ww-Dh8cOISsgVUAzNz27cvQDxVnAJU0iguhz8g11FIpJrUR56QwSv93LS9JsSwf7JimMQ3nV-SuTZ2nJd0c6JimCW2aMcdvT53PfswxHShOb2mO-X1PQ5pp16VXijnj-LnckIuA0-KLE1dkeLgf2qdy-_zYt5ttGQ3LpdUWpNNKB-4DNhxHbgNqsJLBEQrMGHSolWNwdFbp2ikXrACnZY0oxIqs_2aj9373Ncc9zj-701_xC2gBSS8</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>CoDe - An collaborative detection algorithm for DDoS attacks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Shalinie, S. M. ; Kumar, M. P. M. ; Karthikeyan, M. ; Sajani, J. D. ; Nachammai, V. A. ; Sundarakantham, K. ; Mallikarjunan, K. N.</creator><creatorcontrib>Shalinie, S. M. ; Kumar, M. P. M. ; Karthikeyan, M. ; Sajani, J. D. ; Nachammai, V. A. ; Sundarakantham, K. ; Mallikarjunan, K. N.</creatorcontrib><description>Security threats for the network services have been constantly increasing day by day. Distributed denial of service (DDoS) attack is one such kind of security threat which involves multiple systems generating a large amount of traffic towards a target machine and thereby making any service from that target machine or server unavailable to its clients. This threat by nature needs no control over the target system. Traditional methods of detecting DDoS attacks are mostly centralized in nature and highly disadvantageous. To overcome the disadvantages of those schemes, we propose a distributed methodology which involves installing the attack detectors at various parts of the network. Each router in the network will monitor the traffic flowing through it and if any anomaly in the traffic pattern is detected, it will raise an alarm to the nearby routers. The alarm propagates to all the routers through which the attack flows. By this way a tree like construct is made, which will have information about number of alarms raised and the path of the attack flow. If the construct shows any converging pattern then it is declared as DDoS attack.</description><identifier>ISBN: 9781457705885</identifier><identifier>ISBN: 1457705885</identifier><identifier>EISBN: 1457705893</identifier><identifier>EISBN: 1457705907</identifier><identifier>EISBN: 9781457705908</identifier><identifier>EISBN: 9781457705892</identifier><identifier>DOI: 10.1109/ICRTIT.2011.5972338</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer crime ; DDoS ; Detection algorithms ; Distributed Change Point Detection ; IP networks ; Ranking scheme ; Routing protocols ; Servers ; Statistical methods ; Traffic control ; UDP Flood attack</subject><ispartof>2011 International Conference on Recent Trends in Information Technology (ICRTIT), 2011, p.113-118</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5972338$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5972338$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Shalinie, S. M.</creatorcontrib><creatorcontrib>Kumar, M. P. M.</creatorcontrib><creatorcontrib>Karthikeyan, M.</creatorcontrib><creatorcontrib>Sajani, J. D.</creatorcontrib><creatorcontrib>Nachammai, V. A.</creatorcontrib><creatorcontrib>Sundarakantham, K.</creatorcontrib><creatorcontrib>Mallikarjunan, K. N.</creatorcontrib><title>CoDe - An collaborative detection algorithm for DDoS attacks</title><title>2011 International Conference on Recent Trends in Information Technology (ICRTIT)</title><addtitle>ICRTIT</addtitle><description>Security threats for the network services have been constantly increasing day by day. Distributed denial of service (DDoS) attack is one such kind of security threat which involves multiple systems generating a large amount of traffic towards a target machine and thereby making any service from that target machine or server unavailable to its clients. This threat by nature needs no control over the target system. Traditional methods of detecting DDoS attacks are mostly centralized in nature and highly disadvantageous. To overcome the disadvantages of those schemes, we propose a distributed methodology which involves installing the attack detectors at various parts of the network. Each router in the network will monitor the traffic flowing through it and if any anomaly in the traffic pattern is detected, it will raise an alarm to the nearby routers. The alarm propagates to all the routers through which the attack flows. By this way a tree like construct is made, which will have information about number of alarms raised and the path of the attack flow. If the construct shows any converging pattern then it is declared as DDoS attack.</description><subject>Computer crime</subject><subject>DDoS</subject><subject>Detection algorithms</subject><subject>Distributed Change Point Detection</subject><subject>IP networks</subject><subject>Ranking scheme</subject><subject>Routing protocols</subject><subject>Servers</subject><subject>Statistical methods</subject><subject>Traffic control</subject><subject>UDP Flood attack</subject><isbn>9781457705885</isbn><isbn>1457705885</isbn><isbn>1457705893</isbn><isbn>1457705907</isbn><isbn>9781457705908</isbn><isbn>9781457705892</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo1j81KxDAUhSMiqGOfYDZ5gdbcpGkScDO0_hQGBO1-uGkSjXYm0gbBt3fA8Ww-Dh8cOISsgVUAzNz27cvQDxVnAJU0iguhz8g11FIpJrUR56QwSv93LS9JsSwf7JimMQ3nV-SuTZ2nJd0c6JimCW2aMcdvT53PfswxHShOb2mO-X1PQ5pp16VXijnj-LnckIuA0-KLE1dkeLgf2qdy-_zYt5ttGQ3LpdUWpNNKB-4DNhxHbgNqsJLBEQrMGHSolWNwdFbp2ikXrACnZY0oxIqs_2aj9373Ncc9zj-701_xC2gBSS8</recordid><startdate>201106</startdate><enddate>201106</enddate><creator>Shalinie, S. M.</creator><creator>Kumar, M. P. M.</creator><creator>Karthikeyan, M.</creator><creator>Sajani, J. D.</creator><creator>Nachammai, V. A.</creator><creator>Sundarakantham, K.</creator><creator>Mallikarjunan, K. N.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201106</creationdate><title>CoDe - An collaborative detection algorithm for DDoS attacks</title><author>Shalinie, S. M. ; Kumar, M. P. M. ; Karthikeyan, M. ; Sajani, J. D. ; Nachammai, V. A. ; Sundarakantham, K. ; Mallikarjunan, K. N.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-b8b15d878f2efa62ac2bfa81b501a81719cf8f47d012acb784d7dfb31d854aa33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computer crime</topic><topic>DDoS</topic><topic>Detection algorithms</topic><topic>Distributed Change Point Detection</topic><topic>IP networks</topic><topic>Ranking scheme</topic><topic>Routing protocols</topic><topic>Servers</topic><topic>Statistical methods</topic><topic>Traffic control</topic><topic>UDP Flood attack</topic><toplevel>online_resources</toplevel><creatorcontrib>Shalinie, S. M.</creatorcontrib><creatorcontrib>Kumar, M. P. M.</creatorcontrib><creatorcontrib>Karthikeyan, M.</creatorcontrib><creatorcontrib>Sajani, J. D.</creatorcontrib><creatorcontrib>Nachammai, V. A.</creatorcontrib><creatorcontrib>Sundarakantham, K.</creatorcontrib><creatorcontrib>Mallikarjunan, K. N.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Shalinie, S. M.</au><au>Kumar, M. P. M.</au><au>Karthikeyan, M.</au><au>Sajani, J. D.</au><au>Nachammai, V. A.</au><au>Sundarakantham, K.</au><au>Mallikarjunan, K. N.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>CoDe - An collaborative detection algorithm for DDoS attacks</atitle><btitle>2011 International Conference on Recent Trends in Information Technology (ICRTIT)</btitle><stitle>ICRTIT</stitle><date>2011-06</date><risdate>2011</risdate><spage>113</spage><epage>118</epage><pages>113-118</pages><isbn>9781457705885</isbn><isbn>1457705885</isbn><eisbn>1457705893</eisbn><eisbn>1457705907</eisbn><eisbn>9781457705908</eisbn><eisbn>9781457705892</eisbn><abstract>Security threats for the network services have been constantly increasing day by day. Distributed denial of service (DDoS) attack is one such kind of security threat which involves multiple systems generating a large amount of traffic towards a target machine and thereby making any service from that target machine or server unavailable to its clients. This threat by nature needs no control over the target system. Traditional methods of detecting DDoS attacks are mostly centralized in nature and highly disadvantageous. To overcome the disadvantages of those schemes, we propose a distributed methodology which involves installing the attack detectors at various parts of the network. Each router in the network will monitor the traffic flowing through it and if any anomaly in the traffic pattern is detected, it will raise an alarm to the nearby routers. The alarm propagates to all the routers through which the attack flows. By this way a tree like construct is made, which will have information about number of alarms raised and the path of the attack flow. If the construct shows any converging pattern then it is declared as DDoS attack.</abstract><pub>IEEE</pub><doi>10.1109/ICRTIT.2011.5972338</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781457705885 |
ispartof | 2011 International Conference on Recent Trends in Information Technology (ICRTIT), 2011, p.113-118 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5972338 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Computer crime DDoS Detection algorithms Distributed Change Point Detection IP networks Ranking scheme Routing protocols Servers Statistical methods Traffic control UDP Flood attack |
title | CoDe - An collaborative detection algorithm for DDoS attacks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T21%3A37%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=CoDe%20-%20An%20collaborative%20detection%20algorithm%20for%20DDoS%20attacks&rft.btitle=2011%20International%20Conference%20on%20Recent%20Trends%20in%20Information%20Technology%20(ICRTIT)&rft.au=Shalinie,%20S.%20M.&rft.date=2011-06&rft.spage=113&rft.epage=118&rft.pages=113-118&rft.isbn=9781457705885&rft.isbn_list=1457705885&rft_id=info:doi/10.1109/ICRTIT.2011.5972338&rft.eisbn=1457705893&rft.eisbn_list=1457705907&rft.eisbn_list=9781457705908&rft.eisbn_list=9781457705892&rft_dat=%3Cieee_6IE%3E5972338%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-b8b15d878f2efa62ac2bfa81b501a81719cf8f47d012acb784d7dfb31d854aa33%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5972338&rfr_iscdi=true |