Skip to main content

DDA: An Approach to Handle DDoS (Ping Flood) Attack

  • Conference paper
  • First Online:
Proceedings of International Conference on ICT for Sustainable Development

Abstract

Distributed denial of service attack (DDoS) is an attempt by malicious hosts to overload website, network, e-mail servers, applications, network resources, bandwidth, etc. Globally DDoS attacks affected four out of ten organizations (around 41 %) over the past few years. Challenges involved in taking counter measures against DDoS attacks are network infrastructure, identifying legitimate traffic from polluted traffic, attacker anonymity, large problem space, nature of attacks, etc. Several approaches proposed in the past few years to combat the problem of DDoS attacks. These approaches suffer for many limitations. Some of the limitations include: implementing filtering at router (firewall enabled) will create bottleneck, additional traffic, no means of sending alert to an innocent host acting as a bot, etc. Ping flood attack is one kind of DDoS attack. In this paper, ping flood attack is analyzed and a new approach, distributed defence approach (DDA) is proposed to mitigate ping flood attack. Distributed defence is applied with the help of routers connected to network when count of PING request crosses a threshold limit or packet size is greater than normal ping packet size. Concept of the proposed approach is to help the end router by putting less load during filtering attack packets, enhancing the speed of processing and informing the innocent host acting as bot simultaneously making the DDoS attack ineffective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mirkovic, J., Hussain, A., Wilson, B., Fahmy, S., Reiher, P., Thomas, R., Yao, W., & Schwab, S. (2007). Towards user centric metrics for denial of service measurement. ExpCS’07, San Diego, CA. 13–14, June 2007. Copyright 2007 ACM.

    Google Scholar 

  2. Jin, C., Wang, H., & Shin, K.G. (2003). Hop-count filtering: an effective defense against spoofed DDos traffic. CCS’03, October 27–31, 2003, Washington, DC, USA. Copyright 2003 ACM 1-58113-738-9/03/0010.

    Google Scholar 

  3. Peng, T., Leckie, C., & Ramamohanarao, K. (2007). Survey of network-based defense mechanisms countering the DoS and DDos problems. ACM Computing Surveys, 39(1), Article 3 (April 2007), p. 42. doi:10.1145/1216370.1216373.

    Google Scholar 

  4. Kumar, S., & Surisetty, S. Microsoft versus apple: resilience against distributed denial-of-service attacks. IEEE Security and Privacy, 10(2).

    Google Scholar 

  5. Jing, Y., Wang, X., Xiao, X., & Zhang, G. (2006). Defending against meek DDos attacks by IP traceback-based rate limiting. Global Telecommunications Conference, 2006. GLOBECOM ‘06. IEEE, November 27 2006–December 1 2006.

    Google Scholar 

  6. Rao, S., & Rao, S. (2011). Denial of service attacks and mitigation techniques: Real time implementation with detailed analysis. This paper is from the SANS Institute Reading Room site©.

    Google Scholar 

  7. Kiran Tupakula, U., & Varadharajan, V. (2006). Analysis of traceback techniques. This paper appeared at the Fourth Australasian Information Security Workshop (AISW-NetSec 2006), Hobart, Australia. Conferences in Research and Practice in Information Technology (CRPIT), vol. 54.

    Google Scholar 

  8. Zhu, Z., Lu, G., Chen, Y., Judy Fu, Z., Roberts, P., & Han, K. (2008). Botnet research survey. Annual IEEE International Computer Software and Applications Conference, © 2008 IEEE.

    Google Scholar 

  9. Kiran Tupakula, U., Varadharajan, V., & Pandalaneni, S. R. (2009). DoSTRACK: a system for defending against DoS attacks. SAC ‘09 Proceedings of the 2009 ACM Symposium on Applied Computing (pp. 47–53). New York, NY, USA: ACM: ©2009.

    Google Scholar 

  10. Yuan, D., & Zhong, J. (2008). A lab implementation of SYN flood attack and defense. SIGITE ‘08 Proceedings of the 9th ACM SIGITE Conference on Information Technology Education (pp. 57–58). New York, NY, USA: ACM ©2008.

    Google Scholar 

  11. Bolz, C., Romney, G. W., & Rogers, B. L. (2004). Safely train security engineers regarding the dangers presented by denial of service attacks. Proceeding CITC5 ‘04 Proceedings of the 5th Conference on Information Technology Education (pp. 66–72) New York, NY, USA: ACM ©2004.

    Google Scholar 

  12. Batham, S., Yadav, V. K., & Kumar Mallik, V. K. (2014). ICSECV: An efficient approach of video encryption. In Proceedings Contemporary Computing (IC3), 2014 Seventh International Conference, 7–9 August 2014, pp. 425–430 (Available at IEEE Xplorer and DBLP, indexed by SCOPUS).

    Google Scholar 

  13. Batham, S, & Yadav,V. K. et al. (2013). A new video encryption algorithm based on indexed based chaotic sequence. In Proceedings Fourth International conference Confluence 2013: The Next Generation Information Technology Summit, September 27–28 (pp. 139–143). Available at IET and IEEE xplorer.

    Google Scholar 

  14. Yadav, V. K., & Batham, S. et al. (2013). Hiding large amount of data using a new approach of video steganography. In Proceedings Fourth International Conference Confluence 2013: The Next Generation Information Technology Summit, Sept 27–28, pp. 337–343 (Available at IET and IEEE xplorer).

    Google Scholar 

Webliography

  1. http://blog.radware.com/security/2013/05/how-much-can-a-DDos-attack-cost-your-business/.

  2. http://www.scmp.com/news/hong-kong/article/1534725/cyberattack-threatens-derails-occupycentrals-unofficial-referendum.

  3. http://www.digitalattackmap.com/#anim=1&color=2&country=ALL&time=16238&view=map.

Download references

Acknowledgments

I would like to thanks my guru Dr. B.M. Mehtre whose is also co-author of this paper, for his kind nature, faith and of course the guidance from time-to-time during the fellowship program. I would also like to thanks my parents, whose blessings are constant inspiration to me and also to Varsha Yadav for sharing his valuable time to share her knowledge.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Virendra Kumar Yadav .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Yadav, V.K., Trivedi, M.C., Mehtre, B.M. (2016). DDA: An Approach to Handle DDoS (Ping Flood) Attack. In: Satapathy, S., Joshi, A., Modi, N., Pathak, N. (eds) Proceedings of International Conference on ICT for Sustainable Development. Advances in Intelligent Systems and Computing, vol 408. Springer, Singapore. https://doi.org/10.1007/978-981-10-0129-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0129-1_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0127-7

  • Online ISBN: 978-981-10-0129-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics