SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4862
DDOS TRAFFIC CONTROL USING DSA ALGORITHM WITH STRUCTURE
INFORMATION IN SDN
PUNITHA JILT A
AP, DEPT OF CSE, ST.ANNES COLLEGE OF ENGINEERING AND TECHNOLOGY, TAMILNADU, INDIA
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract –
Nowadays, computer network is very important because of
the many advantages it has. However, it is also vulnerable to
a lot of threats from attackers and the most common of such
attack is the DNS based Distributed Denial of Service
(DDoS) attack. A detection and defense algorithm against
DDOS attack is very important. Many of the proposed DNS
based DDoS solutions try to prevent/mitigate such attacks
using some intelligent non- “network layer” (typically
application layer) protocols. This can be analyze DNS based
Distributed Denial of Service (DDoS) attack detection and
prevention measures using software defined policies. DDOS
is an attack overloads the firewall by malicious scripts. In
this paper provides efficient prevention method named
Digital Signature Algorithm (DSA) to prevent DDOS
attack. It provides automatic intrusion detection and
prevention.
Key Words: DDOS, DNS, DSA, detection, defence, intrusion
firewall, and software defined policies
1. INTRODUCTION
The current prevalent DNS based DDOS solutions are for
application layer, and not directly implemented at the
network layer. So, via this proposed doctoral research it is
intended to utilize flexibility of SDN and make underlying
network intelligent enough to prevent DNS based DDOS
attacks. More specifically, it is intended to design, develop,
and validate SDN based framework which will introduce
“appropriate intelligence” to enhance the functionality of
Openflow enabled L2/L3 switches so that underlying
network itself can prevent and mitigate DNS based DDoS
attacks. For each incoming or outgoing packet, a firewall
decides to accept or discard it based on its policy. A
firewall policy is composed of a sequence of rules, where
each rule specifies a predicate over five different fields:
source and destination port, source and destination IP
address, and IP protocol. Typically, firewall policies do not
check the source port field. The rules in a firewall policy
may overlap and conflict.
1.1EXISTING SYSTEM
There is no deployed technology that has successfully
defended against DDOS attacks. Most of the approaches
focus, perhaps understandably, on protection of customer
sites against incoming attacks. This turns out to be very
difficult to do with today's Internet architecture and
protocols. Thus in existing system, both firewall security
for servers and application security are not efficient and
highly secure.
1.2 PROPOSED SYSTEM
It provides efficient prevention method named Digital
Signature Algorithm (DSA) to prevent DDOS attack. DSA
algorithm avoid botnet intrusion and validate each user by
key based authentication system.Our proposed system
provides automatic intrusion detection and prevention
against DNS based DDOS attack using SDN based
programmability. Also our proposed system provides the
infrastructure details before and after attacks.
2. MODULES:
DDOS Attack
2.1 PREVENTION MEASURE:
 DEEP PACKET INSPECTION (DPI)
 Digital Signature Algorithm (DSA):
 Filter Based Approach
 Software Puzzle Based Approach
 Key seed mechanism
3. ALGORITHM:
The DDoS identification is then based on the detection of
anomalies in the characteristics of the packet attributes.
Description of the botnet identification algorithm, it is
worth commenting on a possible limitation of the
proposed approach.
Step 1: Collect network traffic packets and flow
information in real-time.
Step 2: Pre-process network traffic by
cumulatively averaging it as in (2)
Step 3: By using AR model, predict the network
traffic.
Step 4: Find out the prediction error by (4)
Step 5: Detect the abnormal traffic by analyzing
prediction error based on chaos theory
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4863
Step 6: Detect DDoS by using trained neural
network.
4. ARCHITECTURE
Attacker
Fig -1: SDN Based method for IP Block
ATTACKER
SECURITY MANAGER
Fig -2: Server side
5. CONCLUSION
Cloud is the important part of the fast growing network
based on the internet and the availability of the cloud is
the most important. To keep the cloud all the time
available to the users, it is necessary to have the detection
and prevention for the threats which affect on the
availability of the cloud. This paper provides the
techniques available for detection and prevention for the
DNS based DDoS attack using SDN policies are effective.
The future work is to find a solution which can
successfully detect and prevent DDoS attack in cloud
REFERENCES
[1] E. Bertino and N. Islam, ‘‘Botnets and Internet of Things
security,’’ Computer, vol. 50, no. 2, pp. 76–79, Feb. 2017.
[2] J. Mirkovic, G. Prier, and P. Reiher, ‘‘Attacking DDoS at
the Source,’’ in Proc. IEEE Int. Conf. Netw. Protocols. IEEE
Comput. Soc., Nov. 2002, pp. 312–321.
[3] F. Restuccia, S. D’Oro, and T. Melodia, ‘‘Securing the
Internet of Things in the age of machine learning and
software-defined networking,’’ IEEE Internet Things J., vol.
5, no. 6, pp. 4829–4842, Dec. 2018.
[4] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas,
‘‘DDoS in the IoT: Mirai and other botnets,’’ Computer, vol.
50, no. 7, pp. 80–84, 2017.
[5] G. Wangen, A. Shalaginov, and C. Hallstensen, ‘‘Cyber
security risk assessment of a DDoS attack,’’ in Proc. Int.
Conf. Secur. Cham, Switzerland: Springer, Aug. 2016, pp.
183–202.
LOGIN
CAPTCHA
SECURITY
QUESTION
S
Overwhel
ming the
target
network
with attack
SDN
CONTROLLE
Filter Based
Approach
Deep Packet
Inspection
IP BLOCK
Security manager
SERVER
SDN BASED
PREVENTIO
N
MEASURE:
1. Digital
Overwhel
ming the
target
network
with
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4864
[6] K. Malialis and D. Kudenko, ‘‘Multiagent router
throttling: Decentralized coordinated response against
DDoS attacks,’’ in Proc. 25th IAAI Conf.. Jun. 2013, pp.
1551–1556.
[7] K. Malialis and D. Kudenko, ‘‘Distributed response to
network intrusions using multi agent reinforcement
learning,’’Eng.Appl.Artif.Intell.,vol.41, pp. 270–284, May

More Related Content

What's hot

Iaona handbook for network security - draft rfc 0.4
Iaona   handbook for network security - draft rfc 0.4Iaona   handbook for network security - draft rfc 0.4
Iaona handbook for network security - draft rfc 0.4
Ivan Carmona
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2
LinkedIn
 
SecuringAWirelessNetwork_Capstone
SecuringAWirelessNetwork_CapstoneSecuringAWirelessNetwork_Capstone
SecuringAWirelessNetwork_Capstone
Cecil Sellars
 

What's hot (19)

Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system
 
Intrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implementIntrusion detection system: classification, techniques and datasets to implement
Intrusion detection system: classification, techniques and datasets to implement
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
 
Iaona handbook for network security - draft rfc 0.4
Iaona   handbook for network security - draft rfc 0.4Iaona   handbook for network security - draft rfc 0.4
Iaona handbook for network security - draft rfc 0.4
 
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
 
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network  Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
 
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT SecurityA Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized Users
 
The authenticated network architecture
The authenticated network architectureThe authenticated network architecture
The authenticated network architecture
 
SecuringAWirelessNetwork_Capstone
SecuringAWirelessNetwork_CapstoneSecuringAWirelessNetwork_Capstone
SecuringAWirelessNetwork_Capstone
 
Ijnsa050208
Ijnsa050208Ijnsa050208
Ijnsa050208
 

Similar to IRJET - DDOS Traffic Control using DSA Algorithm with Structure Information in SDN

Similar to IRJET - DDOS Traffic Control using DSA Algorithm with Structure Information in SDN (20)

IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
 
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...IRJET-  	  An Intrusion Detection and Protection System by using Data Mining ...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
A Comparative Study of Deep Learning Approaches for Network Intrusion Detecti...
A Comparative Study of Deep Learning Approaches for Network Intrusion Detecti...A Comparative Study of Deep Learning Approaches for Network Intrusion Detecti...
A Comparative Study of Deep Learning Approaches for Network Intrusion Detecti...
 
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
 
IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
IRJET- Enhancing Network Security by Modified Secure Dynamic Path IdentifiersIRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
 
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
 
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.Literature Review on DDOS Attacks Detection Using SVM algorithm.
Literature Review on DDOS Attacks Detection Using SVM algorithm.
 
DNS Data Exfiltration Detection
DNS Data Exfiltration DetectionDNS Data Exfiltration Detection
DNS Data Exfiltration Detection
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
 
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelAn Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 

Recently uploaded (20)

Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2Research Methodolgy & Intellectual Property Rights Series 2
Research Methodolgy & Intellectual Property Rights Series 2
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 

IRJET - DDOS Traffic Control using DSA Algorithm with Structure Information in SDN

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4862 DDOS TRAFFIC CONTROL USING DSA ALGORITHM WITH STRUCTURE INFORMATION IN SDN PUNITHA JILT A AP, DEPT OF CSE, ST.ANNES COLLEGE OF ENGINEERING AND TECHNOLOGY, TAMILNADU, INDIA ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract – Nowadays, computer network is very important because of the many advantages it has. However, it is also vulnerable to a lot of threats from attackers and the most common of such attack is the DNS based Distributed Denial of Service (DDoS) attack. A detection and defense algorithm against DDOS attack is very important. Many of the proposed DNS based DDoS solutions try to prevent/mitigate such attacks using some intelligent non- “network layer” (typically application layer) protocols. This can be analyze DNS based Distributed Denial of Service (DDoS) attack detection and prevention measures using software defined policies. DDOS is an attack overloads the firewall by malicious scripts. In this paper provides efficient prevention method named Digital Signature Algorithm (DSA) to prevent DDOS attack. It provides automatic intrusion detection and prevention. Key Words: DDOS, DNS, DSA, detection, defence, intrusion firewall, and software defined policies 1. INTRODUCTION The current prevalent DNS based DDOS solutions are for application layer, and not directly implemented at the network layer. So, via this proposed doctoral research it is intended to utilize flexibility of SDN and make underlying network intelligent enough to prevent DNS based DDOS attacks. More specifically, it is intended to design, develop, and validate SDN based framework which will introduce “appropriate intelligence” to enhance the functionality of Openflow enabled L2/L3 switches so that underlying network itself can prevent and mitigate DNS based DDoS attacks. For each incoming or outgoing packet, a firewall decides to accept or discard it based on its policy. A firewall policy is composed of a sequence of rules, where each rule specifies a predicate over five different fields: source and destination port, source and destination IP address, and IP protocol. Typically, firewall policies do not check the source port field. The rules in a firewall policy may overlap and conflict. 1.1EXISTING SYSTEM There is no deployed technology that has successfully defended against DDOS attacks. Most of the approaches focus, perhaps understandably, on protection of customer sites against incoming attacks. This turns out to be very difficult to do with today's Internet architecture and protocols. Thus in existing system, both firewall security for servers and application security are not efficient and highly secure. 1.2 PROPOSED SYSTEM It provides efficient prevention method named Digital Signature Algorithm (DSA) to prevent DDOS attack. DSA algorithm avoid botnet intrusion and validate each user by key based authentication system.Our proposed system provides automatic intrusion detection and prevention against DNS based DDOS attack using SDN based programmability. Also our proposed system provides the infrastructure details before and after attacks. 2. MODULES: DDOS Attack 2.1 PREVENTION MEASURE:  DEEP PACKET INSPECTION (DPI)  Digital Signature Algorithm (DSA):  Filter Based Approach  Software Puzzle Based Approach  Key seed mechanism 3. ALGORITHM: The DDoS identification is then based on the detection of anomalies in the characteristics of the packet attributes. Description of the botnet identification algorithm, it is worth commenting on a possible limitation of the proposed approach. Step 1: Collect network traffic packets and flow information in real-time. Step 2: Pre-process network traffic by cumulatively averaging it as in (2) Step 3: By using AR model, predict the network traffic. Step 4: Find out the prediction error by (4) Step 5: Detect the abnormal traffic by analyzing prediction error based on chaos theory
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4863 Step 6: Detect DDoS by using trained neural network. 4. ARCHITECTURE Attacker Fig -1: SDN Based method for IP Block ATTACKER SECURITY MANAGER Fig -2: Server side 5. CONCLUSION Cloud is the important part of the fast growing network based on the internet and the availability of the cloud is the most important. To keep the cloud all the time available to the users, it is necessary to have the detection and prevention for the threats which affect on the availability of the cloud. This paper provides the techniques available for detection and prevention for the DNS based DDoS attack using SDN policies are effective. The future work is to find a solution which can successfully detect and prevent DDoS attack in cloud REFERENCES [1] E. Bertino and N. Islam, ‘‘Botnets and Internet of Things security,’’ Computer, vol. 50, no. 2, pp. 76–79, Feb. 2017. [2] J. Mirkovic, G. Prier, and P. Reiher, ‘‘Attacking DDoS at the Source,’’ in Proc. IEEE Int. Conf. Netw. Protocols. IEEE Comput. Soc., Nov. 2002, pp. 312–321. [3] F. Restuccia, S. D’Oro, and T. Melodia, ‘‘Securing the Internet of Things in the age of machine learning and software-defined networking,’’ IEEE Internet Things J., vol. 5, no. 6, pp. 4829–4842, Dec. 2018. [4] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, ‘‘DDoS in the IoT: Mirai and other botnets,’’ Computer, vol. 50, no. 7, pp. 80–84, 2017. [5] G. Wangen, A. Shalaginov, and C. Hallstensen, ‘‘Cyber security risk assessment of a DDoS attack,’’ in Proc. Int. Conf. Secur. Cham, Switzerland: Springer, Aug. 2016, pp. 183–202. LOGIN CAPTCHA SECURITY QUESTION S Overwhel ming the target network with attack SDN CONTROLLE Filter Based Approach Deep Packet Inspection IP BLOCK Security manager SERVER SDN BASED PREVENTIO N MEASURE: 1. Digital Overwhel ming the target network with
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4864 [6] K. Malialis and D. Kudenko, ‘‘Multiagent router throttling: Decentralized coordinated response against DDoS attacks,’’ in Proc. 25th IAAI Conf.. Jun. 2013, pp. 1551–1556. [7] K. Malialis and D. Kudenko, ‘‘Distributed response to network intrusions using multi agent reinforcement learning,’’Eng.Appl.Artif.Intell.,vol.41, pp. 270–284, May