Dos flooding attack control in information-centric networks

  • Authors

    • Srinivasa Rao T
    • Harsha G
    • Kiran V
    • Hemanth Kumar K
    2017-12-21
    https://doi.org/10.14419/ijet.v7i1.1.9708
  • Information Centric Networks, Dos Attack, Flooding Attack, Snort Rules, Dynamic IP.
  • ICN (Information-centric networking) is a modern networking standard that mainly works only on the content extraction from a network without taking into case about the storage location or how the content is represented. In ICN providing security for the content is more important. Here we don’t concentrate on protecting path. In order to fulfil the security goals in the new standard, it is very decisive to have a clear complete comprehension about ICN attacks and their brief allocation and the solutions. In this paper we in brief explain the attacks which effect the ICN network and other related attacks which have an impact on ICN. Attacks in ICN are divided to four categories, routing attacks, Naming attacks, Caching attacks, and other various related attacks. There are lot of solutions which are accessible. The main moto in ICN is to protect data which is very hard to achieve. So we develop a dynamic host based IP address scheme including certain snort rules which detect attacker and distinguish them in the clients and secure server from resource exhaustion. Our main center we deal with is on availability, and privacy.

  • References

    1. [1] Detection of DDOS Attacks Using Snort DetectionNagoorMeerasaheb Lanke#1, CH. Raja Jacob#2 #1CSE Dept., Nova College of Engineering & Technology, Vegavaram,JangareddyGudem , #2CSE Dept., M-Tech, CSE, Nova Nova College of Engineering & Technology, Vegavaram,JangareddyGudem.

      [2] Using Network Packet Generators and Snort Rules for Teaching Denial of Service Attacks Dr. ZouheirTrabelsi United Arab Emirates University P.O Box 17551, Al Ain, UAE 3-7135570, 00971 Trabelsi@uaeu.ac.ae LatifaAlketbi United Arab Emirates University P.O Box 89289, Al Ain, UAE 50-1822636, 00971 200812217@uaeu.ac.ae.

      [3] A Survey of Security Attacks in Information-Centric Networking Eslam G. AbdAllah, Student Member, IEEE, Hossam S. Hassanein, Senior Member, IEEE, and Mohammad Zulkernine, Senior Member, IEEE.

      [4] A Survey of Information-Centric Networking Research George Xylomenos, Christopher N. Ververidis, Vasilios A. Siris, Nikos Fotiou, Christos Tsilopoulos, XenofonVasilakos, Konstantinos V. Katsaros, and George C. Polyzos.

      [5] Security Aspects of the Information Centric Networks Modelamahfouth99@gmail.com Computer Information System Al Quds Open Univeristy.

      [6] www.snort.org

      [7] A. Sardana, R. Joshi, and T. hoon Kim, “Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain,†in Proc. ISA, Apr. 2008, pp. 270–275. [13] I. B.Mopari, S. G. Pukale, and M. L.

      [8] Dhore, “Detection of DDoS attack and defense against IP spoofing,†in Proc. ACM ICAC3, 2009, pp.489–493. [14] Jéerôme François, IssamAib, RaoufBoutaba,†FireCol.

      [9] A Collaborative Protection Network for the Detection of Flooding DDoS Attacksâ€, IEEE 2012 Transaction on Networking, Volume: PP, Issue: 99.

  • Downloads

  • How to Cite

    Rao T, S., G, H., V, K., & Kumar K, H. (2017). Dos flooding attack control in information-centric networks. International Journal of Engineering & Technology, 7(1.1), 303-305. https://doi.org/10.14419/ijet.v7i1.1.9708