International Journal of Computer Networks and Communications Security

Volume 8, Issue 1, January 2020

 

 

Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks
 

Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks

Pages: 1-9 (9) | [Full Text] PDF (534 KB)
S SINGH, EA BHANDARI, KK SALUJA, A SANGAL
Deptt. Of Computer Engineering, University College of Engineering, Punjabi University Patiala
S.B.S.C.E.T Ferozpur, India
Ambedkar NIT, Jalandhar, India

https://doi.org/10.47277/IJCNCS/8(1)1


Abstract -
Network technology has experienced explosive growth in the past decades. The generally accepted viewpoint in the security world is that no system or network is totally protected which makes network security an important concern. The work done in this paper focuses on Distributed Denial of Service Attacks (DDoS) where legitimate users are prevented from accessing network services. Distributed Denial of Service (DDoS) Attacks has been increasingly found to be disturbing the normal working of organizations causing billions of rupees of losses. Organizations are trying their best to reduce their losses from these systems. The focus of this paper is to providing our results of experiments in this regard for flooding based DDoS attacking in the simulation environment with NS2.35. This paper point out that the bandwidth may be more easily flooded by UDP-type attacking than by TCP-type one at different attack strength. In this paper we done the validation of DropTail and RED queue under the flooding based DDoS attack, which is better for the legitimate user under the flooding attack.
 
Index Terms - DoS, DDoS, TCP, UDP, DropTail, RED

Citation - S SINGH, EA BHANDARI, KK SALUJA, A SANGAL. "Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks." International Journal of Computer Networks and Communications Security 8, no. 1 (2020): 1-9.