CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Study on High Rate Shrew DDOS Attack

by Kanika Minhas, Amanpreet Kaur, Dheerendera Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 10
Year of Publication: 2015
Authors: Kanika Minhas, Amanpreet Kaur, Dheerendera Singh
10.5120/21576-4635

Kanika Minhas, Amanpreet Kaur, Dheerendera Singh . A Study on High Rate Shrew DDOS Attack. International Journal of Computer Applications. 121, 10 ( July 2015), 17-20. DOI=10.5120/21576-4635

@article{ 10.5120/21576-4635,
author = { Kanika Minhas, Amanpreet Kaur, Dheerendera Singh },
title = { A Study on High Rate Shrew DDOS Attack },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 10 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 17-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number10/21576-4635/ },
doi = { 10.5120/21576-4635 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:08:05.130541+05:30
%A Kanika Minhas
%A Amanpreet Kaur
%A Dheerendera Singh
%T A Study on High Rate Shrew DDOS Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 10
%P 17-20
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Denial of Service attacks are frequently presenting an increasing threat to the global inter-networking infrastructure in networking area . The algorithm for TCP congestion control algorithm is highly efficient for the various networking areas and operations as well its internal assumption of end-system cooperation results are well prone to attack by high-rate flows. A Shrew attack uses the concept of a low-rate burst which is carefully designed to use the TCP's retransmission timeout mechanism in an unfair way and can affect the bandwidth of a TCP flow in a smooth manner without coming into appearance as an intruder. An Shrew attack has further classifications such as a low rate shrew attack or an high rate shrew attack. A high rated shrew attack uses the concept of timely sending high rate packet stream in low frequency. Such attack can affect the performance of a network to a large extent.

References
  1. Imad Aad etal, "Transactions on Networking", "Impact of denial of service attacks on Adhoc networks",.
  2. Y-C. Hu et al, "A Secure on Demend Routing protocol", Mobile Communication 2002,pp:12-33.
  3. Minda Xiang et al, "Mitigating DDoS attacks using protection nodes in Mobile Adhoc Networks",IEEE 2011.
  4. Wenyuan Xu "Jamming Sensor Networks: Attack and Defens Strategies. IEEE Network May/June 2006
  5. A. Hussain, J. Heidemann, and C. Papadopoulos, "A framework for classifying denial of service attacks," in Proc. ACM SIGCOMM '03, Karlsruhe, Germany, Aug. 2003, pp. 99–110.
  6. C. Gong and K. Sarac, "A more practical approach for single-packet IP traceback using packet logging and marking," IEEE Trans. Parallel Distributed Syst. , vol. 19, no. 10, pp. 1310–1324, Oct. 2008.
  7. Wei-Shen Lai et al, "Using Adaptive bandwidth a location approach to defend DDoS attacks",ACM 2008.
  8. A. Hussain, J. Heidemann, and C. Papadopoulos, "A framework for classifying denial of service attacks," in Proc. ACM SIGCOMM '03, Karlsruhe, Germany, Aug. 2003, pp. 99–110.
  9. B. Al-Duwari andM. Govindarasu, "Novel hybrid schemes employing packet marking and logging for IP traceback," IEEE Trans. Parallel Distributed Syst. , vol. 17, no. 5, pp. 403–418, May 2006.
  10. C. Gong and K. Sarac, "A more practical approach for single-packet IP traceback using packet logging and marking," IEEE Trans. Parallel Distributed Syst. , vol. 19, no. 10, pp. 1310–1324, Oct. 2008.
  11. H. Burch and B. Cheswick, "Tracing anonymous packets to their approximate source," in Proc. USENIX LISA 2000, New Orleans, LA, Dec. 2000, pp. 319–327.
  12. S. Acedanski, S. Deb, M. Medard, and R. Koetter, "How Good Is Random Linear Coding Based Distributed Networked Storage," Proc. Workshop Network Coding, Theory and Applications, Apr. 2005.
  13. P. A. Chou, Y. Wu, and K. Jain, "Practical Network Coding," Proc. Allerton Conf. Comm. , Control, and Computing, Oct. 2003.
  14. C. Gkantsidis and P. R. Rodriguez, "Network Coding for Large Scale Content Distribution," Proc. IEEE INFOCOM, pp. 2235-2245, 2005.
  15. S. Vincent and J. I. Raja, "A Survey of IP Traceback to overcome Denial of service attacks" in Proc. Recent Advances in Networking,VLSI and Signal Processing.
  16. M. Hour Yang and M. Chein Yang, "RIHT- A Novel Hybrid IP Traceback scheme" in Proc. IEEE Trans on Information Forensics and Security, April 2012, vol. 7,no. 2, pg. 789- 797
  17. S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," in Proc. ACM SIGCOMM2000, Stockholm, Sweden, Aug. 2000, pp. 295– 306.
  18. A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, and W. T. Strayer, "Single-packet IP traceback," IEEE/ACM Trans. Networking, vol. 10, no. 6, pp. 721–734, Dec. 2002.
Index Terms

Computer Science
Information Sciences

Keywords

DDOS-Distributed Denial Of Service Attack TCP-Transfer Control Protocol DNS-Domain Name Services RTO-Retransmission Time Out.