Preventing DDOS Attack by Dynamic Path Identifiers In Internet

Ananth Teja, V.Aditya Ramalingeswararao


The enterprise, employment, and assessment of D-PID, a basis that uses PIDs transferred between adjacent domains as inter-domain routing objects. In DPID, the PID of an inter-domain path linking two domains is reserved clandestine and changes animatedly. We label in part how neighboring domains negotiate PIDs, how to uphold constant communications when PIDs change. We shape a 42-node sample comprised by six domains to prove D-PID’s possibility and demeanor widespread admirations to gauge its efficacy and charge.


J. Francois, I. Aib, and R. Boutaba, “Firecol: a Collaborative Protection Network for the Detection of Flooding ddos Attacks,” IEEE/ACM Trans.on Netw., vol. 20, no. 6, Dec. 2012, pp. 1828-1841.

OVH hosting suffers 1Tbps DDoS attack: largest Internet has ever seen. [Online] Available: https: // 1tbps- ddos-attack/.

602 Gbps! This May Have Been the Largest DDoS Attack in History.

S. T. Zargar, J. Joshi, D. Tipper, “A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks,” IEEECommun. Surv.&Tut., vol. 15, no. 4, pp. 2046 - 2069, Nov. 2013.

P. Ferguson and D. Senie, “Network Ingress Filtering: Defeating Denial of Service Attacks that Employ IP Source Address Spoofing,” IETFInternet RFC 2827, May 2000.

K. Park and H. Lee, “On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets,” In Proc. SIGCOMM’01, Aug. 2001, San Diego, CA, USA.

A. Yaar, A. Perrig, D. Song, “StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense,” IEEE J. on Sel. Areasin Commun., vol. 24, no. 10, pp. 1853 - 1863, Oct. 2006.

H. Wang, C. Jin, K. G. Shin, “Defense Against Spoofed IP Traffic Using Hop-Count Filtering,” IEEE/ACM Trans. on Netw., vol. 15, no. 1, pp. 40 - 53, Feb. 2007.

Z. Duan, X. Yuan, J. Chandrashekar, “Controlling IP Spoofing through Interdomain Packet Filters,” IEEE Trans. on Depend. and Secure Computing, vol. 5, no. 1, pp. 22 - 36, Feb. 2008.

S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Practical Network Support for IP Traceback,” In Proc. SIGCOMM’00, Aug. 2000, Stockholm, Sweden.

A. C. Snoeren, C. Partridge, L. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer, “Hash-Based IP Traceback,” In Proc.SIGCOMM’01, Aug. 2001, San Diego, CA, USA.

M. Sung, J. Xu, “IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks,” IEEE Trans. OnParall.and Distr. Sys., vol. 14, no. 9, pp. 861 - 872, Sep. 2003.

M. Sung, J. Xu, J. Li, L. Li, “Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Information-Theoretic Foundation,” IEEE/ACM Trans. on Netw., vol. 16, no. 6, pp. 1253 - 1266, Dec. 2008.

Y. Xiang, K. Li, W. Zhou, “Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics,” IEEE Trans. on Inf.Foren.and Sec., vol. 6, no. 2, pp. 426 - 437, May 2011.

H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, S. Shenker, “Off by default!,” In Proc. HotNets-IV, Nov. 2005, College Park, MD, USA.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.|

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at