Treesa Nice P A and Amitha Mathew, Department of Computer Science and Engineering, Rajagiri School of Engineering and Technology, Kerala, India.
International Journal of Advanced Computing and Communication Systems
ISSN (Online) : 2347 - 9299
ISSN (Print) : 2347 - 9280
Received On : 04 January 2014
Revised On : 04 February 2014
Accepted On : 15 February 2014
Published On : 05 March 2014
Volume 01, Issue 01
Page No : 011-014
The legitimate user of a service is denied from getting that service is known as Denial of Service (DoS) attack. If the attack is from a group of adversaries, then the attack is known as Distributed Denial of Service (DDoS) attack. In usual case of DDoS attacks, the network will be flooded with a large number of illegitimate packets. Then the bandwidth will be increased. From the large increase in the bandwidth, it can be assumed that DoS attack has been occurred. But if the attack is intended for a single application, it will be difficult to make even a guess, because the bandwidth may not be increased to a large extent.The method used earlier was acknowledgement based port-hopping. The port through which the data is sent will be changed after getting the acknowledgement. If the acknowledgement is lost, then the port will be opened for a long time. Then it will be easy for the attacker to make a directed attack. In order to avoid that, the port will be changed dynamically after a hopping period. This hopping period will be calculated by using a seed and a secret function. Even after port-hopping, if the attacker assumes the correct port number, attack may happen. In order to avoid that, a cryptographic method is also used with port-hopping method. An encryption algorithm can be used for security. Thus amount of DDoS attack can be reduced.
DoS, DDoS, Encryption, Port-hopping, cryptographic algorithm.
Treesa Nice P A and Amitha Mathew, “A Cryptographic Application-Level DDoS Mitigation Using Port-Hopping Method, ”International Journal of Advanced Computing and Communication Systems, pp. 011-014, March, 2014.
© 2014 Treesa Nice P A and Amitha Mathew. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Download