Visible to the public Distributed Denial of Service Attack Prevention from Traffic Flow for Network Performance Enhancement

TitleDistributed Denial of Service Attack Prevention from Traffic Flow for Network Performance Enhancement
Publication TypeConference Paper
Year of Publication2021
AuthorsGera, Jaideep, Rejeti, Venkata Kishore Kumar, Sekhar, Jaladi N Chandra, Shankar, A Siva
Conference Name2021 2nd International Conference on Smart Electronics and Communication (ICOSEC)
KeywordsBanking, composability, Customer relationship management, DDoS Attack Prevention, DDoS Attacks, denial-of-service attack, distinguish of DDoS from flash event, distributed denial of service, employee welfare, Entropy, flash events, Human Behavior, Metrics, pubcrawl, resilience, Resiliency, Servers, supply chain management
AbstractCustomer Relationship Management (CRM), Supply Chain Management (SCM), banking, and e-commerce are just a few of the internet-primarily based commercial enterprise programmes that make use of distributed computing generation. These programmes are the principal target of large-scale attacks known as DDoS attacks, which cause the denial of service (DoS) of resources to legitimate customers. Servers that provide dependable services to real consumers in distributed environments are vulnerable to such attacks, which send phoney requests that appear legitimate. Flash crowd, on the other hand, is a massive collection of traffic generated by flash events that imitate Distributed Denial of Service assaults. Detecting and distinguishing between Distributed Denial of Service assaults and flash crowds is a difficult problem to tackle, as is preventing DDoS attacks. Existing solutions are generally intended for DDoS attacks or flash crowds, and more research is required to have a thorough understanding. This study presents a technique for distinguishing between different types of Distributed Denial of Service attacks and Flash Crowds. This research work has suggested an approach to prevent DDOS attacks in addition to detecting and discriminating. The performance of the suggested technique is validated using NS-2 simulations.
DOI10.1109/ICOSEC51865.2021.9591974
Citation Keygera_distributed_2021