{"title":"基于域间路由的动态路径标识防止分布式拒绝服务的方法","authors":"S. Nandyal, Sabiya Sultana","doi":"10.1109/ICGCIOT.2018.8753063","DOIUrl":null,"url":null,"abstract":"Lately, there are expanding consequence in utilizing an inter-domain routing objects as Path Identifiers (PIDs). In any case, PIDs utilized in current methodologies are static, which makes simple for attackers to dispatch Distributed Denial-of Service (DDoS) flooding attacks. To deal with this consequence, it gives the consideration for the construction, performance and assessment of DPID, an architecture which utilizes PIDs negotiated amidst adjoining domains as inter-domain routing. In DPID, inter-domain route of PID bridging two domains is preserved as secret and varies dynamically. This system portrays exactly how adjoining domains handle PIDs, in what way it manages continuous communications while PIDs change. It builds 22-node model which holds three domains to authenticate DPID’s usefulness and leads comprehensive simulations to figure out its capability and cost. Outcomes from both experiments and simulations demonstrate that D-PID can effectively prohibit DDoS attacks. In D-PID, it gives the outcome as two contiguous domains frequently update the PIDs amidst them and install new PIDs for packet forwarding into the data plane. Hence, it concludes regardless of whether the attacker acquires PIDs of its destination and later forwards malicious packets successfully, after a particular time period these PIDs turn to be invalid and the following packets will be sent from other path to the destination. Besides, if any attacker strives to retrieve new PIDs and carries DDoS flooding attack, as a matter there will be increment in attacking cost, as well as makes it simple for detecting the attacker.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Approach for Prohibiting Distributed Denial-OF-Service Using Dynamic Path Identifiers through Inter-Domain Routing\",\"authors\":\"S. Nandyal, Sabiya Sultana\",\"doi\":\"10.1109/ICGCIOT.2018.8753063\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Lately, there are expanding consequence in utilizing an inter-domain routing objects as Path Identifiers (PIDs). In any case, PIDs utilized in current methodologies are static, which makes simple for attackers to dispatch Distributed Denial-of Service (DDoS) flooding attacks. To deal with this consequence, it gives the consideration for the construction, performance and assessment of DPID, an architecture which utilizes PIDs negotiated amidst adjoining domains as inter-domain routing. In DPID, inter-domain route of PID bridging two domains is preserved as secret and varies dynamically. This system portrays exactly how adjoining domains handle PIDs, in what way it manages continuous communications while PIDs change. It builds 22-node model which holds three domains to authenticate DPID’s usefulness and leads comprehensive simulations to figure out its capability and cost. Outcomes from both experiments and simulations demonstrate that D-PID can effectively prohibit DDoS attacks. In D-PID, it gives the outcome as two contiguous domains frequently update the PIDs amidst them and install new PIDs for packet forwarding into the data plane. Hence, it concludes regardless of whether the attacker acquires PIDs of its destination and later forwards malicious packets successfully, after a particular time period these PIDs turn to be invalid and the following packets will be sent from other path to the destination. Besides, if any attacker strives to retrieve new PIDs and carries DDoS flooding attack, as a matter there will be increment in attacking cost, as well as makes it simple for detecting the attacker.\",\"PeriodicalId\":269682,\"journal\":{\"name\":\"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICGCIOT.2018.8753063\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICGCIOT.2018.8753063","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Approach for Prohibiting Distributed Denial-OF-Service Using Dynamic Path Identifiers through Inter-Domain Routing
Lately, there are expanding consequence in utilizing an inter-domain routing objects as Path Identifiers (PIDs). In any case, PIDs utilized in current methodologies are static, which makes simple for attackers to dispatch Distributed Denial-of Service (DDoS) flooding attacks. To deal with this consequence, it gives the consideration for the construction, performance and assessment of DPID, an architecture which utilizes PIDs negotiated amidst adjoining domains as inter-domain routing. In DPID, inter-domain route of PID bridging two domains is preserved as secret and varies dynamically. This system portrays exactly how adjoining domains handle PIDs, in what way it manages continuous communications while PIDs change. It builds 22-node model which holds three domains to authenticate DPID’s usefulness and leads comprehensive simulations to figure out its capability and cost. Outcomes from both experiments and simulations demonstrate that D-PID can effectively prohibit DDoS attacks. In D-PID, it gives the outcome as two contiguous domains frequently update the PIDs amidst them and install new PIDs for packet forwarding into the data plane. Hence, it concludes regardless of whether the attacker acquires PIDs of its destination and later forwards malicious packets successfully, after a particular time period these PIDs turn to be invalid and the following packets will be sent from other path to the destination. Besides, if any attacker strives to retrieve new PIDs and carries DDoS flooding attack, as a matter there will be increment in attacking cost, as well as makes it simple for detecting the attacker.