Hybrid Approach for IP Traceback Analysis in Wireless Networks

Distributed Denial-Of-Service (DDoS) attacks are one of the all the more difficult security issues on the Internet today. They can without much of a stretch, fumes the assets of the potential Victims. The issue is much more extreme since the aggressors regularly produce their IP delivers to shroud their character. The current guard mechanism against DDoS attacks, the attack traffic will be filtered at the victim’s side. For this situation, regardless of whether the attacking traffic is filtered by the victim, the attacker may achieve the objective of blocking access to the victim’s bandwidth. IP-Traceback approaches enable the victim to traceback to the wellspring of an attack and they will not be able to minimize the attack when the attack is in progress. Hence in this work we proposed a hybrid method to minimize the quantity of malicious packets entering into the network. We introduce a quantum annealing technique at the server side to identify and mitigate the DDoS attack. The attack messages are minimized by utilizing client puzzle as a part of the ingress router; the path fingerprint is used at the egress side. Simulation studies prove that the proposed mechanism is optimally successful in recognizing and mitigating the DDoS attacks.

[1]  Jaydip Sen,et al.  A Robust Mechanism for Defending Distributed Denial OF Service Attacks on Web Servers , 2011, ArXiv.

[2]  Robert Stone,et al.  CenterTrack: An IP Overlay Network for Tracking DoS Floods , 2000, USENIX Security Symposium.

[3]  Jennifer S. Raj,et al.  Secured Self Organizing Network Architecture in Wireless Personal Networks , 2017, Wirel. Pers. Commun..

[4]  M. I. Fanany,et al.  A SPARSE ENCODING SYMMETRIC MACHINES PRE-TRAINING FOR TEMPORAL DEEP BELIEF NETWORKS FOR MOTION ANALYSIS AND SYNTHESIS , 2015 .

[5]  Dinesh C. Verma,et al.  Policy-based management of content distribution networks , 2002, IEEE Netw..

[6]  Paul Ferguson,et al.  Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.

[7]  Robert H. Deng,et al.  Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks , 2015, IEEE Transactions on Information Forensics and Security.

[8]  S. Smys,et al.  Construction of virtual backbone to support mobility in MANET — A less overhead approach , 2009, 2009 International Conference on Application of Information and Communication Technologies.

[9]  Eric Tutu Tchao,et al.  On Distributed Denial of Service Current Defense Schemes , 2019, Technologies.

[10]  Indraneel Sreeram,et al.  HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm , 2019, Applied Computing and Informatics.

[11]  Anna R. Karlin,et al.  Network support for IP traceback , 2001, TNET.

[12]  Vern Paxson,et al.  End-to-end routing behavior in the Internet , 1996, TNET.

[13]  Craig Partridge,et al.  Hardware support for a hash-based IP traceback , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[14]  Craig Partridge,et al.  Hash-based IP traceback , 2001, SIGCOMM.

[15]  Shigeyuki Matsuda,et al.  Tracing Network Attacks to Their Sources , 2002, IEEE Internet Comput..

[16]  B. Chakrabarti,et al.  Quantum Annealing and Related Optimization Methods , 2008 .

[17]  Colin Boyd,et al.  Fair Client Puzzles from the Bitcoin Blockchain , 2016, ACISP.

[18]  Nirwan Ansari,et al.  IP traceback with deterministic packet marking , 2003, IEEE Communications Letters.

[19]  Steven M. Bellovin,et al.  ICMP Traceback Messages , 2003 .

[20]  Dawn Xiaodong Song,et al.  Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[21]  Kotagiri Ramamohanarao,et al.  Protection from distributed denial of service attacks using history-based IP filtering , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[22]  Bikas K. Chakrabarti,et al.  Quantum Annealing and Other Optimization Methods , 2005 .

[23]  Jaydip Sen,et al.  Security and Privacy Issues in Wireless Mesh Networks: A Survey , 2013, Wireless Networks and Security.

[24]  S. Smys,et al.  A hybrid multilevel authentication scheme for private cloud environment , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).

[25]  Shivendu Mishra,et al.  Strong Password Based EAP-TLS Authentication Protocol for WiMAX , 2010 .

[26]  Michael T. Goodrich,et al.  Efficient packet marking for large-scale IP traceback , 2002, CCS '02.

[27]  Nirwan Ansari,et al.  Accommodating fragmentation in deterministic packet marking for IP traceback , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[28]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[29]  S. Smys,et al.  Efficient cryptographic approach for data security in wireless sensor networks using MES V-U , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).

[30]  Jerry R. Hobbs,et al.  An algebraic approach to IP traceback , 2002, TSEC.

[31]  Ajith Abraham,et al.  Computational Social Networks: Security and Privacy , 2012 .

[32]  Ayako Suzuki,et al.  Mathematical Models of IP Traceback Methods and Their Verification , 2005, SEC.

[33]  Saiful Adli Ismail,et al.  Review of Recent Detection Methods for HTTP DDoS Attack , 2019, J. Comput. Networks Commun..

[34]  A. Praveena,et al.  Anonymization in Social Ne tworks: A Survey on the issues of Data Privacy in Social Network Sites , 2016 .

[35]  Ashok Singh Sairam,et al.  ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters , 2014, Comput. Commun..