IDEAS home Printed from https://ideas.repec.org/a/igg/jismd0/v9y2018i1p56-76.html
   My bibliography  Save this article

Security Integration in DDoS Attack Mitigation Using Access Control Lists

Author

Listed:
  • Sumit Kumar Yadav

    (Indira Gandhi Delhi Technical University for Women, Delhi, India)

  • Kavita Sharma

    (National Institute of Technology Kurukshetra, India)

  • Arushi Arora

    (Indira Gandhi Delhi Technical University for Women, Delhi, India)

Abstract

In this article, the authors propose a DDoS mitigation system through access list-based configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to prohibit DDoS attacks over ISPs' networks traffic. The effectiveness of the proposed system relies heavily on the willingness of ISPs in implementing the system. Once each ISP implements the system, most attacks can easily be stopped close to their point of origin. The main challenge is to implement such a system with the fixed amount of memory and available processing power with routers. A coordinated effort by participating ISPs filters out attacks close to their source, reducing the load on other routers. The suspicious traffic is first filtered out based on their source IP address. The authors also implemented the WRED algorithm for their case and conduct GNS3 experiments in a simulated environment.

Suggested Citation

  • Sumit Kumar Yadav & Kavita Sharma & Arushi Arora, 2018. "Security Integration in DDoS Attack Mitigation Using Access Control Lists," International Journal of Information System Modeling and Design (IJISMD), IGI Global, vol. 9(1), pages 56-76, January.
  • Handle: RePEc:igg:jismd0:v:9:y:2018:i:1:p:56-76
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISMD.2018010103
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jismd0:v:9:y:2018:i:1:p:56-76. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.