A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks

A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks

M. Poongodi, S. Bose
Copyright: © 2014 |Pages: 18
DOI: 10.4018/IJISP.2014040101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Distributed Denial of Service (DDOS) attacks are the major concern for security in the collaborative networks. Although non DDOS attacks are also make the network performances poor, the effect of DDOS attacks is severe. In DDOS attacks, flooding of the particular node as victim and jam it with massive traffic happens and the complete network performance is affected. In this paper, a novel Intrusion Detection and Prevention System is designed which detects the flooding DDOS attacks based on Firecol and prevents the attacks based on Dynamic Growing Self Organizing Tree (DGSOT) for collaborative networks. Simulation results in NS2 shows that DGSOT with Firecol (Firegroup) produces better intrusion detection and prevention system. Performance metrics based on the parameters delay, throughput, average path length, packet data ratio and energy conservation are better in Firegroup than the traditional Firecol system.
Article Preview
Top

Introduction

A Collaborative network consists of various autonomous, heterogeneous and distributed entities with collaborative approach to achieve common goals and the interactions are supported by the computer network architecture. Lot of emphasis is being given related to security in the collaborative networks and the recent research in this domain highlights the various phenomena of the attack detection and prevention mechanisms. DDOS attacks and the defense mechanisms related to the classification are studied (Douligeris C & Mitrokotsa, A, 2003). The structural approach to the problem and the important features of each and every attack in the network with the described pros and cons are presented. DOS attacks on the web services, the vulnerability and inadequate defense mechanism with robustness is explained in (Zhijun Wu & Zhifeng Chen, 2006). Scalable mechanism of Distributed Denial of Service and the associated new network architecture which address the problem of attack is presented with legitimate data sending procedures and their reception criteria (Wang, Fei, et al., 2012). The design decisions and their potential for denial of service attacks in the internet is studied. The state of art methods for defending the attacks, compare the counter measures are also discussed (Awad, M et al., 2004). The routing stability of the internet and the observed route changes over link metric and the analysis based on Principal Component Analysis (PCA) are reviewed as literature (Peng et al., 2007). The new direction in the routing stability measurement and the routing system performance are represented in the model. Network of compromised machines and their nodes controlled by attackers are dealt in Bot-nets which used peer to peer connectivity for remote control mechanisms. Also, the communication channel disruption and the mitigation possibilities are also explored (Yu Chen & Kai Hwang, 2006). A General Intrusion Detection Architecture Enhancing Trust Based Approaches is presented for the mobile adhoc networks. Examination of different intrusion detection systems and the adapted architecture for IDS are explained (Shui Yu & Wanlei Zhou, 2008). With respect to internet routing stability, a number of explanations for the anomalies and the evaluation of their potential impact on the Internet infrastructure is also analyzed (Holz, Thorsten, et al., 2008). The End-to-End Routing behavior in the Internet and their sequential results in the simulation is studied with the routing stability and the routing system parameters (Albers, Patrick, et al., 2002). Various researches related to botnets which describe the possible attacks performed by botnet communication technologies are also explored (Labovitz, Craig, G et al., 1999). To explore the possible vulnerability in the wireless networks against the probable attack, the classification of counter measure selection approaches are carried out and comprehensive prevention mechanism to address DDOS flooding problem is estimated (Saman Taghavi Zargar et al., 2013). In the recent DDOS attacks, most complicated techniques are launched by the attackers. To overcome such multiple attack procedures, integrative approaches need to be carried out. In the LAN environments, the compromised machines serve as spam zombies. In such situation, the packets transmitted across the network have to be scanned through sequential scanning process by employing various statistical methodologies. By detecting the spatial temporal behavior using the grouping flow control detection mechanisms, the IDS exploit the malicious behavior of the host machine.

The major problem in the popular IDS systems is the false alarms and raw alerts. In multi step attack conditions, the analysis of false alarms and raw alerts are controlled by alert correlation tools (Chun-Jen Chung et al., 2013). In order to detect flooding DDOS attack, the collaborative tool Firecol is used. The threats in such distributed attacks are measured based on the bandwidth allocation to the users and Firecol attack detection algorithms by means of their mitigation techniques and the virtual rings effectively exploit the intrusion attack and prevent the malicious spreading (Jérôme François et al., 2012).

The rest of this paper is organized as follows: Section 3 deals with the system design and the architectural components of Firegroup. Section 4 shows the implementation procedures and the simulation analysis with results and screenshots. Section 5 shows the conclusion and the future enhancements followed by references in section 6.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing