Int J Performability Eng ›› 2022, Vol. 18 ›› Issue (7): 529-536.doi: 10.23940/ijpe.22.07.p8.529536

Previous Articles    

Signature-based Traffic Classification for DDoS Attack Detection and Analysis of Mitigation for DDoS Attacks using Programmable Commodity Switches

Yerriswamy T* and Gururaj Murtugudde   

  1. School of CSE, REVA University, Bengaluru, India
  • Submitted on ; Revised on ; Accepted on
  • Contact: * E-mail address: yssvce2123@gmail.com

Abstract: According to a study on vulnerabilities of network security, the novel-based signature, and anomaly-based approaches for Distributed Denial of Service (DDoS) attacks attempt to exploit the security flaws. Based on signature filtering criteria, the goal of this work is to develop an effective strategy for anomaly detection and mitigation of Distributed Denial of Service (DDoS) assaults. Most of today’s performance reduction of internet resources is based on Distributed Denial of Service (DDoS) assaults. Whenever we heard about a website being hacked, we assumed it was the result of a DDoS attack. The accessibility of the services or resources is normally reduced to a legitimate user by overloading the excessive traffic using a zombie distributed network which is due to DDoS assaults. Botnet refers to the widespread network of hacked hosts that carry out the attack. We designed a Non-Anomaly Evolutionary (NAE) Signature-based Model for a DDoS protection system using a signature and anomaly-based method that detects and mitigates assaults at their source, ensuring the network infrastructure's normal operation. According to the findings of the test, our approach took a total average mitigation time of 1.75 seconds with the total average Round Trip Time (RTT) of 0.481 milliseconds to detect DDoS attacks and to mitigate the same when compared to other existing novel signature-based models.

Key words: non-anomaly evolutionary (NAE) signature-based model, distributed denial of service, Botnet, signature filtering, DDoS mitigation system