SlideShare a Scribd company logo
1 of 15
Springer 2nd International Conference on Advanced Informatics for Computing Research,July14-15,2018, India
Cooperative Mitigation of DDoS Attacks Using
Prachi Gulihar B.B. Gupta
National Institute of Technology,
Kurukshetra,India
Prachi Gulihar, B.B. Gupta 1/ 15ICAICR-2018
Optimized Auction Scheme on Cache Servers
Table of Contents
1 Introduction
2 Related Works
3 Proposed Model
4 Description of the Algorithm
5 Simulation Analysis
7 Conclusion and Future Work
Prachi Gulihar, B.B. Gupta ICAICR-2018 2/ 15
6 Advantages
References8
Introduction
Nowadays the Internet plays a vital role in the growth of the
economy for any nation.
1DDoS attacks are one of the major threat that hurting this
growth as it affects the systems and network which uses the
Internet for their business work.
In DDoS attacks, victims bandwidth is flooded with the
excessive amount of malicious or fake traffic due to which, the
victim is unable to serve the legitimate users.
1
J. MirkovicandP. Reiher,“A taxonomyofddosattackandddosdefensemechanisms,”ACMSIGCOMM
ComputerCommunication Review,vol.34,no.2, pp.39–53, 2004.
Prachi Gulihar, B.B. Gupta ICAICR-2018 3/ 15
Prachi Gulihar, B.B. Gupta ICAICR-2018 4/ 19
Figure. 1. Types of DDoS attacks
Figure. 2. Evolution of DDoS attacks
Related Works
Prachi Gulihar, B.B. Gupta ICAICR-2018 5/ 15
Name of
scheme
Author Description
Score For
Core[8]
Kalkan
and
Fatih
A hybrid two level filtering mechanism using trust
information metrics based on information theory,
the rate is further limited based on the user
browsing behavior.
BLoSS[7] Rodrigu
es et al.
A cooperative defense which expands to multiple
domains using the signaling process of blockchain for
attack information in a distributed environment.
CoFence
[5]
Rashidi
et al.
A collaborative defense scheme using network
function virtualization.
FLEX [4] Steinbe
rger et
al.
Uses flow based event exchange format to exchange
event information related to security and have shifted
the defense mechanism from victim side to the
network of ISPs.
Proposed Model
The resource allocation policy used by ORA module can be explained
by the following three phases which are executed in a consecutive
manner of execution.
Cache server selection
Resource allocation
Iterative pricing
Prachi Gulihar, B.B. Gupta ICAICR-2018 6/ 15
Proposed Model
Figure 2: Framework of Proposed Approach
Prachi Gulihar, B.B. Gupta ICAICR-2018 7/ 15
Algorithm 1: Broker Module
Input: Incoming traffic Xin havingpackets Pk
V[t]: Traffic volume at current instant,
Vmax: Maximum capacity of channel
Start
Fetch (Pk header, V[t])
If(Source_address[Pki]ϵblacklist_log&&payload[Pki]==payload[Pkj])
{ Alert(); //malicious behavior
Drop();
Update_log();}
Else Fwd_module(){
If (V[t] <Vmax) //normal flow
{
Fwd_server()
{Send[Xin] -> server;}}
Else Fwd_ORA(); //overflow
Stop
Prachi Gulihar, B.B. Gupta ICAICR-2018 8/ 15
Algorithm 2: ORA Module
Input: Cache servers Csi, configuration(u,m,t) Where, u= server utilization, m= free cache, t= throughput
Start WOA(u, m, t);
fitness = u + (-m) + (-b);
If m_reqd> m
m = -infinity;
Else m = absolute(m_reqd - m);
If t_reqd> t
t = -infinity;
Else t = absolute(t_reqd - t);
Add Csi ->winnerlist;
Send[winnerlist] ->Auction();
Auction() {Fetch(Rank, winnerlist);
Utility= (bid_price – incurred_price) * 1/Rank;
Disperse_traffic[Xin] -> Max(Utility[Csi])
Prachi Gulihar, B.B. Gupta ICAICR-2018 9/ 15
For all Csi
If (Cache_NotAllocated)
{P[next_round]=P[previousround]+Incentive[curre
nt_round];
Send(Participation_Credit P)->Csi
Update_bid()
{
New_bid= old_bid – P;
Proceed(new_bid);}
}
{
Incentive[current_round]=NULL;
Proceed(old_bid);
}
Stop
Simulation Analysis
The schedule of workflows is preprocessed in MATLAB R2013a
and is fed to the whale algorithm and the results are stored in a
CSV file which is inputted to the AA using Engine API.
Prachi Gulihar, B.B. Gupta ICAICR-2018 1 0 / 15
Figure 3. Detection Rate vs. Number if Iterations
Simulation Analysis
Prachi Gulihar, B.B. Gupta ICAICR-2018 11/ 15
Figure. 4.Throughput vs. Number of Iterations
Figure.5.Distribution of attack traffic
among helping servers
Advantages
Combination of services:
The marketplace mechanism should allow the users to express
complementary requirements
Flexibility and predictability: :
The buyer desires an anticipated deal which can be modified and
adjusted with changing needs.
Economic efficiency: :
The policy design should maximize the gains of the participating parties
and should minimize the wastage of the resource.
Double-sided competition: :
The prices should solely depend on the condition of supply and demand
and should neither be biased to seller nor to buyer.
Functional constraints :
Socio-economic objective function needs to be combined with constraints
of the network for optimal results,
Prachi Gulihar, B.B. Gupta ICAICR-2018 12/ 15
Conclusion and Future Work
The proposed resource allocation mechanism distributes
the free cache resource fairly, efficiently and with
incentives to participate in collaborative defense
mechanism.
Whale optimization algorithm finds out the cache servers in
best position to help and makes the allocation optimal.
Continuous double auction scheme ensures fair
collaboration by allowing the both victim server and
helping servers to offers bids.
Prachi Gulihar, B.B. Gupta
ICAICR-2018
1 3 / 15
References
1. Gupta, B. B., Joshi, R. C., &Misra, M. (2009). Defending against distributed denial of service attacks: issues and
challenges. Information Security Journal: A Global Perspective, 18(5), 224-247.
2. https://www.calyptix.com/top-threats/ddos-attacks-101-types-targets-motivations/ [Last access on
21/03/2018].
3. Fujiwara, I. (2012). Study on combinatorial auction mechanism for resource allocation in cloud computing
environment.
4. Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H., &Pras, A. (2016, April). Collaborative DDoS defense using
flow-based security event information. In Network Operations and Management Symposium (NOMS), 2016
IEEE/IFIP (pp. 516-522). IEEE.
5. Rashidi, B., Fung, C., &Bertino, E. (2017). A collaborative ddos defense framework using network function
virtualization. IEEE Transactions on Information Forensics and Security, 12(10), 2483-2497.
6. Devi, S. R., &Yogesh, P. (2012). A hybrid approach to counter application layer DDoS attacks. International
Journal on Cryptography and Information Security (IJCIS), 2(2).
7. Rodrigues, B., Bocek, T., & Stiller, B. (2017). Enabling a Cooperative, Multi-domain DDoS Defense by a
Blockchain Signaling System (BloSS). Semantic Scholar.
8. Kalkan, K., &Alagöz, F. (2016). A distributed filtering mechanism against DDoS attacks: ScoreForCore. Computer
Networks, 108, 199-209.
9. Shuai, C., Jiang, J., & Ouyang, X. (2012). A lightweight cooperative detection framework odfDDoS/DoS attacks
based on counting bloom filter. Journal of Theoretical & Applied Information Technology, 45(1).
10. Fortier, D., Spradlin, J. C., Sigroha, P., & Fulton, A. (2014). U.S. Patent No. 8,909,751. Washington, DC: U.S.
Patent and Trademark Office
11. Mirjalili, S., & Lewis, A. (2016). The whale optimization algorithm. Advances in Engineering Software, 95-100.
12. Jang, M. W. (2004). The actor architecture manual. Department of Computer Science, University of Illinois at
Urbana-Champaign.
13. A. Iosup, H. Li, M. Jan, S. Anoep, C. Dumitrescu, L. Wolters, and D. H. J. Epem (2008). “The grid workloads
archive,” FGCS, vol. 24, no. 7, pp. 672–686.
Prachi Gulihar, B.B. Gupta ICAICR-2018 14/ 15
Thank You!!
Prachi Gulihar, B.B. Gupta ICAICR-2018 15/ 15

More Related Content

Similar to Cooperative mitigation DDoS

Anomaly based PoW Defense
Anomaly based PoW DefenseAnomaly based PoW Defense
Anomaly based PoW DefenseG Prachi
 
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIntrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIRJET Journal
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET Journal
 
A Systematic Review Paper On Cloud Security
A Systematic Review Paper On Cloud SecurityA Systematic Review Paper On Cloud Security
A Systematic Review Paper On Cloud SecuritySandra Long
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET-  	  Sky Shield: A Sketch-Based Defense System against Application Laye...IRJET-  	  Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...IRJET Journal
 
A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) IJECEIAES
 
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in CloudletIRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in CloudletIRJET Journal
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...IRJET Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...IJNSA Journal
 
IRJET - An Auction Mechanism for Product Verification using Cloud
IRJET - An Auction Mechanism for Product Verification using CloudIRJET - An Auction Mechanism for Product Verification using Cloud
IRJET - An Auction Mechanism for Product Verification using CloudIRJET Journal
 
Q-learning based distributed denial of service detection
Q-learning based distributed denial of service detectionQ-learning based distributed denial of service detection
Q-learning based distributed denial of service detectionIJECEIAES
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditingijtsrd
 
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the CloudTo Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloudrahulmonikasharma
 
State of the Art in Cloud Security
State of the Art in Cloud SecurityState of the Art in Cloud Security
State of the Art in Cloud Securityijsrd.com
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit satIAESIJEECS
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksIJCNCJournal
 

Similar to Cooperative mitigation DDoS (20)

Anomaly based PoW Defense
Anomaly based PoW DefenseAnomaly based PoW Defense
Anomaly based PoW Defense
 
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine LearningIntrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine Learning
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
 
A Systematic Review Paper On Cloud Security
A Systematic Review Paper On Cloud SecurityA Systematic Review Paper On Cloud Security
A Systematic Review Paper On Cloud Security
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET-  	  Sky Shield: A Sketch-Based Defense System against Application Laye...IRJET-  	  Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
 
A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC)
 
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in CloudletIRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...
MECHANISMS FOR DIGITAL TRANSFORMATION IN THE EDUCATION AND HEALTHCARE SECTORS...
 
IRJET - An Auction Mechanism for Product Verification using Cloud
IRJET - An Auction Mechanism for Product Verification using CloudIRJET - An Auction Mechanism for Product Verification using Cloud
IRJET - An Auction Mechanism for Product Verification using Cloud
 
Q-learning based distributed denial of service detection
Q-learning based distributed denial of service detectionQ-learning based distributed denial of service detection
Q-learning based distributed denial of service detection
 
Maintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous AuditingMaintaining Secure Cloud by Continuous Auditing
Maintaining Secure Cloud by Continuous Auditing
 
To Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the CloudTo Improve Data Storage Security Levels in the Cloud
To Improve Data Storage Security Levels in the Cloud
 
State of the Art in Cloud Security
State of the Art in Cloud SecurityState of the Art in Cloud Security
State of the Art in Cloud Security
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
 

More from G Prachi

The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architectureG Prachi
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security modelsG Prachi
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilitiesG Prachi
 
Web application security part 02
Web application security part 02Web application security part 02
Web application security part 02G Prachi
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01G Prachi
 
Basic web security model
Basic web security modelBasic web security model
Basic web security modelG Prachi
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system securityG Prachi
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy codeG Prachi
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzingG Prachi
 
Control hijacking
Control hijackingControl hijacking
Control hijackingG Prachi
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Administering security
Administering securityAdministering security
Administering securityG Prachi
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networksG Prachi
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating systemG Prachi
 
Program security
Program securityProgram security
Program securityG Prachi
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptographyG Prachi
 
Information security introduction
Information security introductionInformation security introduction
Information security introductionG Prachi
 

More from G Prachi (20)

The trusted computing architecture
The trusted computing architectureThe trusted computing architecture
The trusted computing architecture
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Mobile platform security models
Mobile platform security modelsMobile platform security models
Mobile platform security models
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
Web application security part 02
Web application security part 02Web application security part 02
Web application security part 02
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01
 
Basic web security model
Basic web security modelBasic web security model
Basic web security model
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy code
 
Exploitation techniques and fuzzing
Exploitation techniques and fuzzingExploitation techniques and fuzzing
Exploitation techniques and fuzzing
 
Control hijacking
Control hijackingControl hijacking
Control hijacking
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Administering security
Administering securityAdministering security
Administering security
 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
 
Program security
Program securityProgram security
Program security
 
Elementary cryptography
Elementary cryptographyElementary cryptography
Elementary cryptography
 
Information security introduction
Information security introductionInformation security introduction
Information security introduction
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Cooperative mitigation DDoS

  • 1. Springer 2nd International Conference on Advanced Informatics for Computing Research,July14-15,2018, India Cooperative Mitigation of DDoS Attacks Using Prachi Gulihar B.B. Gupta National Institute of Technology, Kurukshetra,India Prachi Gulihar, B.B. Gupta 1/ 15ICAICR-2018 Optimized Auction Scheme on Cache Servers
  • 2. Table of Contents 1 Introduction 2 Related Works 3 Proposed Model 4 Description of the Algorithm 5 Simulation Analysis 7 Conclusion and Future Work Prachi Gulihar, B.B. Gupta ICAICR-2018 2/ 15 6 Advantages References8
  • 3. Introduction Nowadays the Internet plays a vital role in the growth of the economy for any nation. 1DDoS attacks are one of the major threat that hurting this growth as it affects the systems and network which uses the Internet for their business work. In DDoS attacks, victims bandwidth is flooded with the excessive amount of malicious or fake traffic due to which, the victim is unable to serve the legitimate users. 1 J. MirkovicandP. Reiher,“A taxonomyofddosattackandddosdefensemechanisms,”ACMSIGCOMM ComputerCommunication Review,vol.34,no.2, pp.39–53, 2004. Prachi Gulihar, B.B. Gupta ICAICR-2018 3/ 15
  • 4. Prachi Gulihar, B.B. Gupta ICAICR-2018 4/ 19 Figure. 1. Types of DDoS attacks Figure. 2. Evolution of DDoS attacks
  • 5. Related Works Prachi Gulihar, B.B. Gupta ICAICR-2018 5/ 15 Name of scheme Author Description Score For Core[8] Kalkan and Fatih A hybrid two level filtering mechanism using trust information metrics based on information theory, the rate is further limited based on the user browsing behavior. BLoSS[7] Rodrigu es et al. A cooperative defense which expands to multiple domains using the signaling process of blockchain for attack information in a distributed environment. CoFence [5] Rashidi et al. A collaborative defense scheme using network function virtualization. FLEX [4] Steinbe rger et al. Uses flow based event exchange format to exchange event information related to security and have shifted the defense mechanism from victim side to the network of ISPs.
  • 6. Proposed Model The resource allocation policy used by ORA module can be explained by the following three phases which are executed in a consecutive manner of execution. Cache server selection Resource allocation Iterative pricing Prachi Gulihar, B.B. Gupta ICAICR-2018 6/ 15
  • 7. Proposed Model Figure 2: Framework of Proposed Approach Prachi Gulihar, B.B. Gupta ICAICR-2018 7/ 15
  • 8. Algorithm 1: Broker Module Input: Incoming traffic Xin havingpackets Pk V[t]: Traffic volume at current instant, Vmax: Maximum capacity of channel Start Fetch (Pk header, V[t]) If(Source_address[Pki]ϵblacklist_log&&payload[Pki]==payload[Pkj]) { Alert(); //malicious behavior Drop(); Update_log();} Else Fwd_module(){ If (V[t] <Vmax) //normal flow { Fwd_server() {Send[Xin] -> server;}} Else Fwd_ORA(); //overflow Stop Prachi Gulihar, B.B. Gupta ICAICR-2018 8/ 15
  • 9. Algorithm 2: ORA Module Input: Cache servers Csi, configuration(u,m,t) Where, u= server utilization, m= free cache, t= throughput Start WOA(u, m, t); fitness = u + (-m) + (-b); If m_reqd> m m = -infinity; Else m = absolute(m_reqd - m); If t_reqd> t t = -infinity; Else t = absolute(t_reqd - t); Add Csi ->winnerlist; Send[winnerlist] ->Auction(); Auction() {Fetch(Rank, winnerlist); Utility= (bid_price – incurred_price) * 1/Rank; Disperse_traffic[Xin] -> Max(Utility[Csi]) Prachi Gulihar, B.B. Gupta ICAICR-2018 9/ 15 For all Csi If (Cache_NotAllocated) {P[next_round]=P[previousround]+Incentive[curre nt_round]; Send(Participation_Credit P)->Csi Update_bid() { New_bid= old_bid – P; Proceed(new_bid);} } { Incentive[current_round]=NULL; Proceed(old_bid); } Stop
  • 10. Simulation Analysis The schedule of workflows is preprocessed in MATLAB R2013a and is fed to the whale algorithm and the results are stored in a CSV file which is inputted to the AA using Engine API. Prachi Gulihar, B.B. Gupta ICAICR-2018 1 0 / 15 Figure 3. Detection Rate vs. Number if Iterations
  • 11. Simulation Analysis Prachi Gulihar, B.B. Gupta ICAICR-2018 11/ 15 Figure. 4.Throughput vs. Number of Iterations Figure.5.Distribution of attack traffic among helping servers
  • 12. Advantages Combination of services: The marketplace mechanism should allow the users to express complementary requirements Flexibility and predictability: : The buyer desires an anticipated deal which can be modified and adjusted with changing needs. Economic efficiency: : The policy design should maximize the gains of the participating parties and should minimize the wastage of the resource. Double-sided competition: : The prices should solely depend on the condition of supply and demand and should neither be biased to seller nor to buyer. Functional constraints : Socio-economic objective function needs to be combined with constraints of the network for optimal results, Prachi Gulihar, B.B. Gupta ICAICR-2018 12/ 15
  • 13. Conclusion and Future Work The proposed resource allocation mechanism distributes the free cache resource fairly, efficiently and with incentives to participate in collaborative defense mechanism. Whale optimization algorithm finds out the cache servers in best position to help and makes the allocation optimal. Continuous double auction scheme ensures fair collaboration by allowing the both victim server and helping servers to offers bids. Prachi Gulihar, B.B. Gupta ICAICR-2018 1 3 / 15
  • 14. References 1. Gupta, B. B., Joshi, R. C., &Misra, M. (2009). Defending against distributed denial of service attacks: issues and challenges. Information Security Journal: A Global Perspective, 18(5), 224-247. 2. https://www.calyptix.com/top-threats/ddos-attacks-101-types-targets-motivations/ [Last access on 21/03/2018]. 3. Fujiwara, I. (2012). Study on combinatorial auction mechanism for resource allocation in cloud computing environment. 4. Steinberger, J., Kuhnert, B., Sperotto, A., Baier, H., &Pras, A. (2016, April). Collaborative DDoS defense using flow-based security event information. In Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP (pp. 516-522). IEEE. 5. Rashidi, B., Fung, C., &Bertino, E. (2017). A collaborative ddos defense framework using network function virtualization. IEEE Transactions on Information Forensics and Security, 12(10), 2483-2497. 6. Devi, S. R., &Yogesh, P. (2012). A hybrid approach to counter application layer DDoS attacks. International Journal on Cryptography and Information Security (IJCIS), 2(2). 7. Rodrigues, B., Bocek, T., & Stiller, B. (2017). Enabling a Cooperative, Multi-domain DDoS Defense by a Blockchain Signaling System (BloSS). Semantic Scholar. 8. Kalkan, K., &Alagöz, F. (2016). A distributed filtering mechanism against DDoS attacks: ScoreForCore. Computer Networks, 108, 199-209. 9. Shuai, C., Jiang, J., & Ouyang, X. (2012). A lightweight cooperative detection framework odfDDoS/DoS attacks based on counting bloom filter. Journal of Theoretical & Applied Information Technology, 45(1). 10. Fortier, D., Spradlin, J. C., Sigroha, P., & Fulton, A. (2014). U.S. Patent No. 8,909,751. Washington, DC: U.S. Patent and Trademark Office 11. Mirjalili, S., & Lewis, A. (2016). The whale optimization algorithm. Advances in Engineering Software, 95-100. 12. Jang, M. W. (2004). The actor architecture manual. Department of Computer Science, University of Illinois at Urbana-Champaign. 13. A. Iosup, H. Li, M. Jan, S. Anoep, C. Dumitrescu, L. Wolters, and D. H. J. Epem (2008). “The grid workloads archive,” FGCS, vol. 24, no. 7, pp. 672–686. Prachi Gulihar, B.B. Gupta ICAICR-2018 14/ 15
  • 15. Thank You!! Prachi Gulihar, B.B. Gupta ICAICR-2018 15/ 15