Loading…

CoDe - An collaborative detection algorithm for DDoS attacks

Security threats for the network services have been constantly increasing day by day. Distributed denial of service (DDoS) attack is one such kind of security threat which involves multiple systems generating a large amount of traffic towards a target machine and thereby making any service from that...

Full description

Saved in:
Bibliographic Details
Main Authors: Shalinie, S. M., Kumar, M. P. M., Karthikeyan, M., Sajani, J. D., Nachammai, V. A., Sundarakantham, K., Mallikarjunan, K. N.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 118
container_issue
container_start_page 113
container_title
container_volume
creator Shalinie, S. M.
Kumar, M. P. M.
Karthikeyan, M.
Sajani, J. D.
Nachammai, V. A.
Sundarakantham, K.
Mallikarjunan, K. N.
description Security threats for the network services have been constantly increasing day by day. Distributed denial of service (DDoS) attack is one such kind of security threat which involves multiple systems generating a large amount of traffic towards a target machine and thereby making any service from that target machine or server unavailable to its clients. This threat by nature needs no control over the target system. Traditional methods of detecting DDoS attacks are mostly centralized in nature and highly disadvantageous. To overcome the disadvantages of those schemes, we propose a distributed methodology which involves installing the attack detectors at various parts of the network. Each router in the network will monitor the traffic flowing through it and if any anomaly in the traffic pattern is detected, it will raise an alarm to the nearby routers. The alarm propagates to all the routers through which the attack flows. By this way a tree like construct is made, which will have information about number of alarms raised and the path of the attack flow. If the construct shows any converging pattern then it is declared as DDoS attack.
doi_str_mv 10.1109/ICRTIT.2011.5972338
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5972338</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5972338</ieee_id><sourcerecordid>5972338</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-b8b15d878f2efa62ac2bfa81b501a81719cf8f47d012acb784d7dfb31d854aa33</originalsourceid><addsrcrecordid>eNo1j81KxDAUhSMiqGOfYDZ5gdbcpGkScDO0_hQGBO1-uGkSjXYm0gbBt3fA8Ww-Dh8cOISsgVUAzNz27cvQDxVnAJU0iguhz8g11FIpJrUR56QwSv93LS9JsSwf7JimMQ3nV-SuTZ2nJd0c6JimCW2aMcdvT53PfswxHShOb2mO-X1PQ5pp16VXijnj-LnckIuA0-KLE1dkeLgf2qdy-_zYt5ttGQ3LpdUWpNNKB-4DNhxHbgNqsJLBEQrMGHSolWNwdFbp2ikXrACnZY0oxIqs_2aj9373Ncc9zj-701_xC2gBSS8</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>CoDe - An collaborative detection algorithm for DDoS attacks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Shalinie, S. M. ; Kumar, M. P. M. ; Karthikeyan, M. ; Sajani, J. D. ; Nachammai, V. A. ; Sundarakantham, K. ; Mallikarjunan, K. N.</creator><creatorcontrib>Shalinie, S. M. ; Kumar, M. P. M. ; Karthikeyan, M. ; Sajani, J. D. ; Nachammai, V. A. ; Sundarakantham, K. ; Mallikarjunan, K. N.</creatorcontrib><description>Security threats for the network services have been constantly increasing day by day. Distributed denial of service (DDoS) attack is one such kind of security threat which involves multiple systems generating a large amount of traffic towards a target machine and thereby making any service from that target machine or server unavailable to its clients. This threat by nature needs no control over the target system. Traditional methods of detecting DDoS attacks are mostly centralized in nature and highly disadvantageous. To overcome the disadvantages of those schemes, we propose a distributed methodology which involves installing the attack detectors at various parts of the network. Each router in the network will monitor the traffic flowing through it and if any anomaly in the traffic pattern is detected, it will raise an alarm to the nearby routers. The alarm propagates to all the routers through which the attack flows. By this way a tree like construct is made, which will have information about number of alarms raised and the path of the attack flow. If the construct shows any converging pattern then it is declared as DDoS attack.</description><identifier>ISBN: 9781457705885</identifier><identifier>ISBN: 1457705885</identifier><identifier>EISBN: 1457705893</identifier><identifier>EISBN: 1457705907</identifier><identifier>EISBN: 9781457705908</identifier><identifier>EISBN: 9781457705892</identifier><identifier>DOI: 10.1109/ICRTIT.2011.5972338</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer crime ; DDoS ; Detection algorithms ; Distributed Change Point Detection ; IP networks ; Ranking scheme ; Routing protocols ; Servers ; Statistical methods ; Traffic control ; UDP Flood attack</subject><ispartof>2011 International Conference on Recent Trends in Information Technology (ICRTIT), 2011, p.113-118</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5972338$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5972338$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Shalinie, S. M.</creatorcontrib><creatorcontrib>Kumar, M. P. M.</creatorcontrib><creatorcontrib>Karthikeyan, M.</creatorcontrib><creatorcontrib>Sajani, J. D.</creatorcontrib><creatorcontrib>Nachammai, V. A.</creatorcontrib><creatorcontrib>Sundarakantham, K.</creatorcontrib><creatorcontrib>Mallikarjunan, K. N.</creatorcontrib><title>CoDe - An collaborative detection algorithm for DDoS attacks</title><title>2011 International Conference on Recent Trends in Information Technology (ICRTIT)</title><addtitle>ICRTIT</addtitle><description>Security threats for the network services have been constantly increasing day by day. Distributed denial of service (DDoS) attack is one such kind of security threat which involves multiple systems generating a large amount of traffic towards a target machine and thereby making any service from that target machine or server unavailable to its clients. This threat by nature needs no control over the target system. Traditional methods of detecting DDoS attacks are mostly centralized in nature and highly disadvantageous. To overcome the disadvantages of those schemes, we propose a distributed methodology which involves installing the attack detectors at various parts of the network. Each router in the network will monitor the traffic flowing through it and if any anomaly in the traffic pattern is detected, it will raise an alarm to the nearby routers. The alarm propagates to all the routers through which the attack flows. By this way a tree like construct is made, which will have information about number of alarms raised and the path of the attack flow. If the construct shows any converging pattern then it is declared as DDoS attack.</description><subject>Computer crime</subject><subject>DDoS</subject><subject>Detection algorithms</subject><subject>Distributed Change Point Detection</subject><subject>IP networks</subject><subject>Ranking scheme</subject><subject>Routing protocols</subject><subject>Servers</subject><subject>Statistical methods</subject><subject>Traffic control</subject><subject>UDP Flood attack</subject><isbn>9781457705885</isbn><isbn>1457705885</isbn><isbn>1457705893</isbn><isbn>1457705907</isbn><isbn>9781457705908</isbn><isbn>9781457705892</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo1j81KxDAUhSMiqGOfYDZ5gdbcpGkScDO0_hQGBO1-uGkSjXYm0gbBt3fA8Ww-Dh8cOISsgVUAzNz27cvQDxVnAJU0iguhz8g11FIpJrUR56QwSv93LS9JsSwf7JimMQ3nV-SuTZ2nJd0c6JimCW2aMcdvT53PfswxHShOb2mO-X1PQ5pp16VXijnj-LnckIuA0-KLE1dkeLgf2qdy-_zYt5ttGQ3LpdUWpNNKB-4DNhxHbgNqsJLBEQrMGHSolWNwdFbp2ikXrACnZY0oxIqs_2aj9373Ncc9zj-701_xC2gBSS8</recordid><startdate>201106</startdate><enddate>201106</enddate><creator>Shalinie, S. M.</creator><creator>Kumar, M. P. M.</creator><creator>Karthikeyan, M.</creator><creator>Sajani, J. D.</creator><creator>Nachammai, V. A.</creator><creator>Sundarakantham, K.</creator><creator>Mallikarjunan, K. N.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201106</creationdate><title>CoDe - An collaborative detection algorithm for DDoS attacks</title><author>Shalinie, S. M. ; Kumar, M. P. M. ; Karthikeyan, M. ; Sajani, J. D. ; Nachammai, V. A. ; Sundarakantham, K. ; Mallikarjunan, K. N.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-b8b15d878f2efa62ac2bfa81b501a81719cf8f47d012acb784d7dfb31d854aa33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computer crime</topic><topic>DDoS</topic><topic>Detection algorithms</topic><topic>Distributed Change Point Detection</topic><topic>IP networks</topic><topic>Ranking scheme</topic><topic>Routing protocols</topic><topic>Servers</topic><topic>Statistical methods</topic><topic>Traffic control</topic><topic>UDP Flood attack</topic><toplevel>online_resources</toplevel><creatorcontrib>Shalinie, S. M.</creatorcontrib><creatorcontrib>Kumar, M. P. M.</creatorcontrib><creatorcontrib>Karthikeyan, M.</creatorcontrib><creatorcontrib>Sajani, J. D.</creatorcontrib><creatorcontrib>Nachammai, V. A.</creatorcontrib><creatorcontrib>Sundarakantham, K.</creatorcontrib><creatorcontrib>Mallikarjunan, K. N.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Shalinie, S. M.</au><au>Kumar, M. P. M.</au><au>Karthikeyan, M.</au><au>Sajani, J. D.</au><au>Nachammai, V. A.</au><au>Sundarakantham, K.</au><au>Mallikarjunan, K. N.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>CoDe - An collaborative detection algorithm for DDoS attacks</atitle><btitle>2011 International Conference on Recent Trends in Information Technology (ICRTIT)</btitle><stitle>ICRTIT</stitle><date>2011-06</date><risdate>2011</risdate><spage>113</spage><epage>118</epage><pages>113-118</pages><isbn>9781457705885</isbn><isbn>1457705885</isbn><eisbn>1457705893</eisbn><eisbn>1457705907</eisbn><eisbn>9781457705908</eisbn><eisbn>9781457705892</eisbn><abstract>Security threats for the network services have been constantly increasing day by day. Distributed denial of service (DDoS) attack is one such kind of security threat which involves multiple systems generating a large amount of traffic towards a target machine and thereby making any service from that target machine or server unavailable to its clients. This threat by nature needs no control over the target system. Traditional methods of detecting DDoS attacks are mostly centralized in nature and highly disadvantageous. To overcome the disadvantages of those schemes, we propose a distributed methodology which involves installing the attack detectors at various parts of the network. Each router in the network will monitor the traffic flowing through it and if any anomaly in the traffic pattern is detected, it will raise an alarm to the nearby routers. The alarm propagates to all the routers through which the attack flows. By this way a tree like construct is made, which will have information about number of alarms raised and the path of the attack flow. If the construct shows any converging pattern then it is declared as DDoS attack.</abstract><pub>IEEE</pub><doi>10.1109/ICRTIT.2011.5972338</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781457705885
ispartof 2011 International Conference on Recent Trends in Information Technology (ICRTIT), 2011, p.113-118
issn
language eng
recordid cdi_ieee_primary_5972338
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Computer crime
DDoS
Detection algorithms
Distributed Change Point Detection
IP networks
Ranking scheme
Routing protocols
Servers
Statistical methods
Traffic control
UDP Flood attack
title CoDe - An collaborative detection algorithm for DDoS attacks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T21%3A37%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=CoDe%20-%20An%20collaborative%20detection%20algorithm%20for%20DDoS%20attacks&rft.btitle=2011%20International%20Conference%20on%20Recent%20Trends%20in%20Information%20Technology%20(ICRTIT)&rft.au=Shalinie,%20S.%20M.&rft.date=2011-06&rft.spage=113&rft.epage=118&rft.pages=113-118&rft.isbn=9781457705885&rft.isbn_list=1457705885&rft_id=info:doi/10.1109/ICRTIT.2011.5972338&rft.eisbn=1457705893&rft.eisbn_list=1457705907&rft.eisbn_list=9781457705908&rft.eisbn_list=9781457705892&rft_dat=%3Cieee_6IE%3E5972338%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-b8b15d878f2efa62ac2bfa81b501a81719cf8f47d012acb784d7dfb31d854aa33%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5972338&rfr_iscdi=true