Autor: |
T., Yerriswamy, Murtugudde, Gururaj |
Předmět: |
|
Zdroj: |
International Journal of Performability Engineering; Jul2022, Vol. 18 Issue 7, p529-536, 8p |
Abstrakt: |
According to a study on vulnerabilities of network security, the novel-based signature, and anomaly-based approaches for Distributed Denial of Service (DDoS) attacks attempt to exploit the security flaws. Based on signature filtering criteria, the goal of this work is to develop an effective strategy for anomaly detection and mitigation of Distributed Denial of Service (DDoS) assaults. Most of today's performance reduction of internet resources is based on Distributed Denial of Service (DDoS) assaults. Whenever we heard about a website being hacked, we assumed it was the result of a DDoS attack. The accessibility of the services or resources is normal ly reduced to a legitimate user by overloading the excessive traffic using a zombie distributed network which is due to DDoS assaults. Botnet refers to the widespread network of hacked hosts that carry out the attack. We designed a Non-Anomaly Evolutionary (NAE) Signature-based Model for a DDoS protection system using a signature and anomaly-based method that detects and mitigates assaults at their source, ensuring the network infrastructure's normal operation. According to the findings of the test, our approach took a total average mitigation time of 1.75 seconds with the total average Round Trip Time (RTT) of 0.481 milliseconds to detect DDoS attacks and to mitigate the same when compared to other existing novel signature-based models. [ABSTRACT FROM AUTHOR] |
Databáze: |
Supplemental Index |
Externí odkaz: |
|