Loading...
International Journal of Advanced Computing and Communication Systems

A Cryptographic Application-Level DDoS Mitigation Using Port-Hopping Method

Treesa Nice P A and Amitha Mathew, Department of Computer Science and Engineering, Rajagiri School of Engineering and Technology, Kerala, India.

International Journal of Advanced Computing and Communication Systems

ISSN (Online) : 2347 - 9299

ISSN (Print) : 2347 - 9280

Received On : 04 January 2014

Revised On : 04 February 2014

Accepted On : 15 February 2014

Published On : 05 March 2014

Volume 01, Issue 01

Page No : 011-014

Abstract

The legitimate user of a service is denied from getting that service is known as Denial of Service (DoS) attack. If the attack is from a group of adversaries, then the attack is known as Distributed Denial of Service (DDoS) attack. In usual case of DDoS attacks, the network will be flooded with a large number of illegitimate packets. Then the bandwidth will be increased. From the large increase in the bandwidth, it can be assumed that DoS attack has been occurred. But if the attack is intended for a single application, it will be difficult to make even a guess, because the bandwidth may not be increased to a large extent.The method used earlier was acknowledgement based port-hopping. The port through which the data is sent will be changed after getting the acknowledgement. If the acknowledgement is lost, then the port will be opened for a long time. Then it will be easy for the attacker to make a directed attack. In order to avoid that, the port will be changed dynamically after a hopping period. This hopping period will be calculated by using a seed and a secret function. Even after port-hopping, if the attacker assumes the correct port number, attack may happen. In order to avoid that, a cryptographic method is also used with port-hopping method. An encryption algorithm can be used for security. Thus amount of DDoS attack can be reduced.

Keywords

DoS, DDoS, Encryption, Port-hopping, cryptographic algorithm.

Cite this Article

Treesa Nice P A and Amitha Mathew, “A Cryptographic Application-Level DDoS Mitigation Using Port-Hopping Method, ”International Journal of Advanced Computing and Communication Systems, pp. 011-014, March, 2014.

Copyright

© 2014 Treesa Nice P A and Amitha Mathew. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Download