A Secure Multi-Path Communication through Dynamic Path Identifiers to Prevent Denial-of-Service Flooding Attacks

Authors

  • Ashok Kumar Yadav Professor, Department of Computer Application, Galgotias University, Greater Noida, Uttar Pradesh, India.
  • Vijaya Bhaskar Ch. Sreenidhi Institute of Science and Technology, Information Technology, Hyderabad, India.
  • Nagaraju M. Sreenidhi Institute of Science and Technology, Information Technology, Hyderabad, India.
  • J. Emerson Raja Senior Lecturer, Faculty of Engineering and Technology, Multimedia University, Selangor, Malaysia. https://orcid.org/0000-0002-4512-0802
  • Sachin S. Pund Assistant Professor, Department of Industrial Engineering, Shri Ramdeobaba College of Engineering and Management, Nagpur, Maharashtra, India.
  • Alka Kumari 6Assistant Professor, School of Eng.&IT, ARKA Jain University, Jamshedpur, Jharkhand, India https://orcid.org/0000-0002-0471-3759

Keywords:

Denial of Service, Flooding Attack, Weighted Adaptive Model, Security

Abstract

Denial of service is characterized by the explicit attempt of the attackers to prevent legitimate user services. With the distributed denial-of-service multiple machines are deployed machines in the network. The denial of service affects the packet stream with the key resources rendering the legitimate clients to provide the ultimate access to the arbitrary damage. In DDoS environment the attacks are distributed with the largescale attempt the malicious users for the enormous number of network packets. The proposed model uses the weighted adaptive cache clustering (WACC) model for the denial of service flooding attacks in the network. The proposed WACC model uses the adaptive model in the estimation of the attack scenario in the network. The proposed WACC model exhibits the reduced False positive Rate, throughput and response rate. The proposed WACC model achieves the maximal delay of 35.41 ms while the conventional TEV achieves the maximal packet delay of 38.15ms and EMC provides the 42.69ms. The estimation expressed that the proposed WACC model achieves a higher throughput value of 88.35%. The analysis concluded that the proposed WACC model achieves improved performance for the prevention of denial-of-services flooding attacks.

Downloads

Download data is not yet available.

References

Kurian, S., & Ramasamy, L. (2021). Securing Service Discovery from Denial of Service Attack in Mobile Ad Hoc Network (MANET). International Journal of Computer Networks and Applications, 8(5), 619-633.

Islam, M. N. U., Fahmin, A., Hossain, M., & Atiquzzaman, M. (2021). Denial-of-service attacks on wireless sensor network and defense techniques. Wireless Personal Communications, 116(3), 1993-2021.

Xu, Y., Deng, G., Zhang, T., Qiu, H., & Bao, Y. (2021). Novel denial-of-service attacks against cloud-based multi-robot systems. Information Sciences, 576, 329-344.

Radain, D., Almalki, S., Alsaadi, H., & Salama, S. (2021, March). A Review on Defense Mechanisms Against Distributed Denial of Service (DDoS) Attacks on Cloud Computing. In 2021 International Conference of Women in Data Science at Taif University (WiDSTaif) (pp. 1-6). IEEE.

Thangavel, S., & Kannan, S. (2022). Detection and trace back of low and high volume of distributed denial‐of‐service attack based on statistical measures. Concurrency and Computation: Practice and Experience, 34(8), e5428.

Tripathi, N., & Hubballi, N. (2021). Application layer denial-of-service attacks and defense mechanisms: a survey. ACM Computing Surveys (CSUR), 54(4), 1-33.

Alamiedy, T. A., Anbar, M. F., Belaton, B., Kabla, A. H., & Khudayer, B. H. (2021, August). Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks. In International Conference on Advances in Cyber Security (pp. 340-360). Springer, Singapore.

Gupta, B. B., Chaudhary, P., Chang, X., & Nedjah, N. (2022). Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers. Computers & Electrical Engineering, 98, 107726.

Syed, N. F., Baig, Z., Ibrahim, A., & Valli, C. (2020). Denial of service attack detection through machine learning for the IoT. Journal of Information and Telecommunication, 4(4), 482-503.

Muhammad, A. W., Foozy, C. F. M., & Azhari, A. (2020). Machine Learning-Based Distributed Denial of Service Attack Detection on Intrusion Detection System Regarding to Feature Selection. International Journal of Artificial Intelligence Research, 4(1), 1-8.

Gohil, M., & Kumar, S. (2020, December). Evaluation of classification algorithms for distributed denial of service attack detection. In 2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE) (pp. 138-141). IEEE.

Alhaidari, F. A., & Alrehan, A. M. (2021). A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc NETwork systems. International Journal of Distributed Sensor Networks, 17(3), 15501477211000287.

Mihoub, A., Fredj, O. B., Cheikhrouhou, O., Derhab, A., & Krichen, M. (2022). Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Computers & Electrical Engineering, 98, 107716.

Aljuhani, A. (2021). Machine learning approaches for combating distributed denial of service attacks in modern networking environments. IEEE Access, 9, 42236-42264.

Kuadey, N. A. E., Maale, G. T., Kwantwi, T., Sun, G., & Liu, G. (2021). DeepSecure: Detection of Distributed Denial of Service Attacks on 5G Network Slicing—Deep Learning Approach. IEEE Wireless Communications Letters, 11(3), 488-492.

Maranhão, J. P. A., da Costa, J. P. C., Javidi, E., de Andrade, C. A. B., & de Sousa Jr, R. T. (2021). Tensor based framework for Distributed Denial of Service attack detection. Journal of Network and Computer Applications, 174, 102894.

WACC model in the DoS attack

Downloads

Published

04.02.2023

How to Cite

Yadav , A. K. ., Bhaskar Ch. , V. ., M., N. ., Raja, J. E. ., S. Pund, S. ., & Kumari , A. . (2023). A Secure Multi-Path Communication through Dynamic Path Identifiers to Prevent Denial-of-Service Flooding Attacks. International Journal of Intelligent Systems and Applications in Engineering, 11(3s), 22–28. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2527

Issue

Section

Research Article