An effective solution for DDOS attack

  • Authors

    • Rusheel Raj Panakadan
    • Chitluri Dhanush
    • Dr Carmel Mary Belinda
    2018-02-05
    https://doi.org/10.14419/ijet.v7i1.7.10650
  • DDoS, Wireshark, Visual Basic scripts, Server, Zombies
  • Distributed Denial of Service (DDoS) attacks constitute one of the major threats and among the hardest security problems in today’s internet. Defense against these attacks is complicated by spoofed source IP addresses, which gives us a tough task to find out the packets origin. So this paper represents a solution for a  DDoS attack. We’ll be using wireshark tool to analyze the network traffic of any interface and find malicious activity by hackers. An algorithm is written at the server side so that if any malicious user sends asynchronous requests at a rate of (>=30 requests per second) then a Visual Basic script is sent to the malicious user. The Visual basic script consists of code encapsulated, allowing system administrators to generate and manage computers with error handling, sub routines etc. This .vbs scripts are made to auto run on the computer, thus making a particular service unavailable to the malicious user. Hereby, stopping the server from partial shutdown or preventing it from DDoS attack.

  • References

    1. [1] Vishal V.Mahale, Nikita P. Pareek, Vrushali U. Uttarwar- 2017,Alleviation of DDoS Attack Using Advance Technique.

      [2] Alisha Gupta and B.B.Gupta-2017, Honeynettrap:Framework to detect and mitigate ddos attacks using Heterogenous Honeypot

      [3] An Lei and Zhu Youchan-2010,The solution of DDOS attack based on Multi-agent

      [4] Ved Prakash Mishra, Balvinder Shukla-2017,Development of Simulator for Intrusion Detection System to detect and alarm the DDOS attack

      [5] An Wang, Student Member, IEEE, Wentao Chang, Student Member, IEEE, Songqing Chen, Senior Member, IEEE Aziz Mohaisen, Senior Member, IEEE, -2017 A Data-Driven Study of DDoS Attacks and TheirDynamics

      [6] PriyankaKamboj, Munesh Chandra Trivedi, Virendra Kumar Yadav, Dr. Vikash Kumar Singh 2017-Detection Techniques of DDoSAttacks:A Survey

      [7] Rahul Paul, Anuja Kumar Acharya, Virendra Kumar Yadav, SaumyaBatham-Hiding Large Amount of Data using a New Approach of Video Steganography- In Proc. Fourth International conference Confluence 2013: The Next Generation Information Technology Summit, Sept 27-28, Page(s): 337 – 343 (available at IET and IEEE xplorer).

      [8] Shivani, Virendra Kumar Yadav, SaumyaBatham-A Novel Approach of Bulk Data Hiding using Text Steganography- Published in Third International Conference on Recent Trends in Computing (ICRTC 2015) will be held in SRM University, NCR Campus, Modinagar, Ghaziabad, India during March 12th – 13th, 2015. Publisher: Elsevier Procedia Computer Science Journal.

      [9] KrishanKumar,A.LSangal,Abhinav Bhandari,'' Traceback Techniques against DDOS Attacks: A Comprehensive Review'',International Conference on Technology(ICCCT),2011. Computer and Communication.

  • Downloads

  • How to Cite

    Raj Panakadan, R., Dhanush, C., & Carmel Mary Belinda, D. (2018). An effective solution for DDOS attack. International Journal of Engineering & Technology, 7(1.7), 194-196. https://doi.org/10.14419/ijet.v7i1.7.10650