{"title":"Finding the DDoS attacks in the network using distance based routing","authors":"P. Sowkarthiga, N. Suguna","doi":"10.1109/ICCTET.2013.6675999","DOIUrl":null,"url":null,"abstract":"Distributed Denial of Service (DDoS) attack is a critical threat to the internet. Botnets are the engines behind them. Botmasters disables the detectors by mimicking the traffic patterns of the flash crowds. It is a critical challenge to those who defend against DDoS attacks. A discrimination algorithm is used to find the flow correlation coefficient to discriminate the attack flows from the flash crowds. We used a routing based algorithm to calculate the dynamic flow correlation coefficient and an IP trace back mechanism is used to find the attackers who mimic the traffic patterns of the flash crowds. We formulated the problem and presented the theoretical proof for the feasibility of the routing based method.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTET.2013.6675999","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Distributed Denial of Service (DDoS) attack is a critical threat to the internet. Botnets are the engines behind them. Botmasters disables the detectors by mimicking the traffic patterns of the flash crowds. It is a critical challenge to those who defend against DDoS attacks. A discrimination algorithm is used to find the flow correlation coefficient to discriminate the attack flows from the flash crowds. We used a routing based algorithm to calculate the dynamic flow correlation coefficient and an IP trace back mechanism is used to find the attackers who mimic the traffic patterns of the flash crowds. We formulated the problem and presented the theoretical proof for the feasibility of the routing based method.