Open Access

ARTICLE

Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack

Saraswathi Shunmuganathan*
Department of Computer Science and Engineering, Sri Sivasubramaniya Nadar College of Engineering, Kalavakkam, Chennai, Tamil Nadu, 603110, India
* Corresponding Author: Saraswathi Shunmuganathan. Email:

Computer Systems Science and Engineering 2023, 44(1), 67-79. https://doi.org/10.32604/csse.2023.023858

Received 24 September 2021; Accepted 01 December 2021; Issue published 01 June 2022

Abstract

The exponential advancement in telecommunication embeds the Internet in every aspect of communication. Interconnections of networks all over the world impose monumental risks on the Internet. A Flooding Attack (FA) is one of the major intimidating risks on the Internet where legitimate users are prevented from accessing network services. Irrespective of the protective measures incorporated in the communication infrastructure, FA still persists due to the lack of global cooperation. Most of the existing mitigation is set up either at the traffic starting point or at the traffic ending point. Providing mitigation at one or the other end may not be a complete solution. To insist on better protection against flooding attacks, this work proposes a cooperative multilevel defense mechanism. The proposed cooperative multilevel defense mechanism consists of two-level of mitigation. In the first level, it is proposed to design a Threshold-based rate-limiting with a Spoofing Resistant Tag (TSRT), as a source end countermeasure for High-Rate Flooding Attacks (HRFA) and spoofing attacks. In the second level, the accent is to discriminate normal traffic after Distributed Denial of Service (DDoS) traffic and drop the DDoS traffic at the destination end. Flow Congruence-based Selective Pushback (FCSP), as a destination-initiated countermeasure for the Low Rate Flooding Attack (LRFA). The source and the destination cooperate to identify and block the attack. A key advantage of this cooperative mechanism is that it can distinguish and channel down the attack traffic nearer to the starting point of the attack. The presentation of the agreeable cooperative multilevel safeguard mechanism is approved through broad recreation in NS-2. The investigation and the exploratory outcomes show that the proposed plan can effectively identify and shield from the attack.

Keywords

Flooding; spoofing; cooperative solution; multilevel security; filtering; pushback

Cite This Article

S. Shunmuganathan and . , "Enforcing a source-end cooperative multilevel defense mechanism to counter flooding attack," Computer Systems Science and Engineering, vol. 44, no.1, pp. 67–79, 2023.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 526

    View

  • 272

    Download

  • 0

    Like

Share Link

WeChat scan