JOURNAL ARTICLE

DDoS Attack Detection and Attacker Identification

Brajesh KashyapSanjay Kumar Jena

Year: 2012 Journal:   International Journal of Computer Applications Vol: 42 (1)Pages: 27-33

Abstract

DDoS attack is a form of DoS attack in which attacker uses authorized user IP address to attack on a particular victim.Of the two types of attack it falls in the active category.The main aim of the attacker is to jam the resources in order to deny services to the recipient.The attacker can use several strategies to achieve this goal, one of which is by flooding the network with bogus requests.The attack is distributed because the attacker is using multiple computers to launch the denial of service attack.In this paper we have first identified the types of DoS and DDoS attack.Then we have provided the solution for those attacks on the basis of attacker's identification.Main focus of this paper is to identify the actual attacker, who has performed attack by sitting behind a forged System.For that purpose first we prevent IP forgery by using sender authentication process, then calculate TCP flow rate and from it we identify whether packets are nor-mal packet or malicious packet.We detect attack on receiver proxy server by using entropy and normalize entropy calculation on receiver proxy server.If attack is detected then we drop packets, get their mark value and trace them back to the source.Finally we use the concept of ISP and IANA to identify the actual attacker.NS2 has been used to simulate the proposed methods.

Keywords:
Computer science Denial-of-service attack Identification (biology) Computer security Application layer DDoS attack World Wide Web The Internet

Metrics

5
Cited By
0.76
FWCI (Field Weighted Citation Impact)
14
Refs
0.75
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

BOOK-CHAPTER

DDoS Attack Detection

Shui Yu

SpringerBriefs in computer science Year: 2013 Pages: 31-53
JOURNAL ARTICLE

DDOS Attack Detection

Dhananjay TangtodeShayan SayyadOmkar GelyeSarthak SawantProf. Girisha Bombale

Journal:   International Journal of Advanced Research in Science Communication and Technology Year: 2024 Pages: 248-251
JOURNAL ARTICLE

Detection of DDoS Attack

Prof. Balasaheb JadhavMansi MahamuniAkshata GhodkeAkshata GhodkeVrushali Chavan

Journal:   International Journal of Advanced Research in Science Communication and Technology Year: 2023 Pages: 498-500
JOURNAL ARTICLE

Face morphing attack detection and attacker identification based on a watchlist

Fei PengLe QinMin Long

Journal:   Signal Processing Image Communication Year: 2022 Vol: 107 Pages: 116748-116748
© 2026 ScienceGate Book Chapters — All rights reserved.