Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
A Distributed Approach to Defend Web Service from DDoS Attacks
Monika Sachdeva, Gurvinder Singh, Kuldip Singh
Pages - 346 - 355     |    Revised - 01-07-2011     |    Published - 05-08-2011
Volume - 5   Issue - 3    |    Publication Date - July / August 2011  Table of Contents
DDoS, Centralized Defense, Distributed Defense, Deployment, Source Address Entropy, Traffic Cluster Entropy
Most of the business applications on the Internet are dependent on web services for their transactions. Distributed denial of service (DDoS) attacks either degrade or completely disrupt web services by sending flood of packets and requests towards the victim web servers. An array of defense schemes are proposed but still defending web service from DDoS attacks is largely an unsolvable problem so far. In this paper, DDoS defense schemes are classified into centralized and distributed and their relative advantages and disadvantages are explored. An ISP based distributed approach is a pragmatic solution to defend from DDoS attacks due to its autonomous control, more resources, and incremental scope. Traffic cluster entropy is conceptualized from source address entropy and the combination is used to detect various types of DDoS attacks against the web service. A framework is proposed which can detect the attack, characterize attack sources, and filter the attack packets as early as possible so as to minimize the collateral damage
CITED BY (2)  
1 Angaitkar, A. V., Shekokar, N., & Maurya, M. The Countering the XDoS Attack for Securing the Web Services.
2 Mahajan, D., & Sachdeva, M. (2013, December). Distinguishing DDoS Attack from Flash Event Using Real-World Datasets with Entropy as an Evaluation Metric. In Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on (pp. 90-94). IEEE.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Libsearch 
5 Bielefeld Academic Search Engine (BASE) 
6 Scribd 
7 SlideShare 
8 PdfSR 
1 M. Sachdeva, G. Singh, K. Kumar and K. Singh. “DoS Incidents and their impact: A review.” The International Arab Journal of Information Technology IAJIT, ISSN: 1683-3198, Vol. 7, No. 1, January 2010, pp. 14-22.
2 C. Douligeris and A. Mitrokotsa. “DDoS attacks and defense mechanisms: classification and state-of-the-art.” Computer Networks, Vol. 44, No. 5, pp. 643–666, April 2004.
3 J. Mirkovic and P. Reiher. “A Taxonomy of DDoS Attack and DDoS Defense Mechanisms.” ACM SIGCOMM Computer Communications Review, Volume 34, No. 2, pp. 39-53, April, 2004.
4 T. Peng, C. Leckie, and K. Ramamohanarao. “Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems.” ACM Computing Surveys, Vol. 39, No. 1, Article 3, April 2007.
5 M. Sachdeva, G. Singh, K. Kumar and K. Singh. “A Comprehensive Survey of Distributed Defense Techniques against DDoS attacks.” International Journal of Computer Science and Network Security (IJCSNS), ISSN: 1738-7906, VOL.9 No.12, December 2009, pp. 7-15.
6 J. Mirkovic. “D-WARD: Source-End Defense Against Distributed Denial-of-service Attacks.” Ph.D. Thesis, University of California, Los Angeles, 2003
7 K. Kumar, R.C. Joshi, and K. Singh. “An ISP Level Distributed approach to detect DDoS Attacks.” Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications, ISBN: 978-1-4020-6265-0 (Print) 978-1-4020-6266-7 (Online), Springer Netherlands, DOI 10.1007/978-1-4020-6266-7, Pages 235-240, September 04, 2007.
8 K. Kumar. “Protection from Distributed Denial of Service (DDoS) Attacks in ISP Domain.” Ph.D. Thesis, Indian Institute of Technology, Roorkee, India, 2007.
9 A. D. Keromytis, V. Misra, and D. Rubenstein. “SOS: An Architecture For Mitigating DDoS Attacks.” IEEE Journal on Selected Areas in Communication, Vol. 22, No.1, pp. 176-188, 2004.
10 C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan. “CROSSACK: Coordinated Suppression of Simultaneous Attacks”, Proceedings of DISCEX, pp. 2-13, 2003.
11 X. Yang, D. Wetherall, and T. Anderson. “A DoS-limiting network architecture”, Proceedings of ACM SIGCOMM, pp. 241-252, 2005.
12 W. Shi, Y. Xiang and W. Zhou. “Distributed Defense Against Distributed Denial-of-Service Attacks”, Proceedings of ICA3PP 2005, LNCS 3719, pp. 357-362,2005.
13 G. Oikonomou, J. Mirkovic, P. Reiher, and M. Robinson. “ A Framework for a Collaborative DDoS Defense”, Proceedings of the 22nd Annual Computer Security Applications Conference, pp. 33-42, 2006.
14 M. Robinson, J. Mirkovic, M. Schnaider, S Michel, and P. Reiher,”Challenges and principles of DDoS defense,” ACM SIGCOMM, 2003.
15 M. Caesar and J. Rexford. “BGP routing policies in ISP networks,”
16 U. K. Tupakula and V. Varadharajan. ”A controller agent model to counteract DoS attacks in multiple domains”, Proceedings of Integrated Network Management, IFIP/IEEE Eighth International Symposium. pp.113-116, 2003
17 S. Chen and Q. Song. “Perimeter-Based Defense against High Bandwidth DDoS Attacks.” IEEE Transactions on Parallel and Distributed Systems, Vol. 16, No. 6, pp. 526-537, June 2005.
18 G. Carl, G. Kesidis, R. R. Brooks, and S. Rai. “Denial-of-Service Attack - Detection Techniques.” IEEE Internet Computing, Vol. 10, No. 1, pp. 82-89, Feb. 2006.
19 C. E. Shannon and W. Weaver. The Mathematical Theory of Communication. University of Illinois Press, 1963.
20 L. Feinstein, D. Schnackenberg, R. Balpuari, and D. Kindred. “Statistical Approaches to DDoS Attack Detection and Response” ,In Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX’03), Vol. 1, pp. 303-314, 2003.
Mr. Monika Sachdeva
SBSCET, Ferozepur - India
Dr. Gurvinder Singh
Guru Nanak Dev University - India
Dr. Kuldip Singh
SBSCET,Ferozepur - India