Article Preview
TopIntroduction
A Collaborative network consists of various autonomous, heterogeneous and distributed entities with collaborative approach to achieve common goals and the interactions are supported by the computer network architecture. Lot of emphasis is being given related to security in the collaborative networks and the recent research in this domain highlights the various phenomena of the attack detection and prevention mechanisms. DDOS attacks and the defense mechanisms related to the classification are studied (Douligeris C & Mitrokotsa, A, 2003). The structural approach to the problem and the important features of each and every attack in the network with the described pros and cons are presented. DOS attacks on the web services, the vulnerability and inadequate defense mechanism with robustness is explained in (Zhijun Wu & Zhifeng Chen, 2006). Scalable mechanism of Distributed Denial of Service and the associated new network architecture which address the problem of attack is presented with legitimate data sending procedures and their reception criteria (Wang, Fei, et al., 2012). The design decisions and their potential for denial of service attacks in the internet is studied. The state of art methods for defending the attacks, compare the counter measures are also discussed (Awad, M et al., 2004). The routing stability of the internet and the observed route changes over link metric and the analysis based on Principal Component Analysis (PCA) are reviewed as literature (Peng et al., 2007). The new direction in the routing stability measurement and the routing system performance are represented in the model. Network of compromised machines and their nodes controlled by attackers are dealt in Bot-nets which used peer to peer connectivity for remote control mechanisms. Also, the communication channel disruption and the mitigation possibilities are also explored (Yu Chen & Kai Hwang, 2006). A General Intrusion Detection Architecture Enhancing Trust Based Approaches is presented for the mobile adhoc networks. Examination of different intrusion detection systems and the adapted architecture for IDS are explained (Shui Yu & Wanlei Zhou, 2008). With respect to internet routing stability, a number of explanations for the anomalies and the evaluation of their potential impact on the Internet infrastructure is also analyzed (Holz, Thorsten, et al., 2008). The End-to-End Routing behavior in the Internet and their sequential results in the simulation is studied with the routing stability and the routing system parameters (Albers, Patrick, et al., 2002). Various researches related to botnets which describe the possible attacks performed by botnet communication technologies are also explored (Labovitz, Craig, G et al., 1999). To explore the possible vulnerability in the wireless networks against the probable attack, the classification of counter measure selection approaches are carried out and comprehensive prevention mechanism to address DDOS flooding problem is estimated (Saman Taghavi Zargar et al., 2013). In the recent DDOS attacks, most complicated techniques are launched by the attackers. To overcome such multiple attack procedures, integrative approaches need to be carried out. In the LAN environments, the compromised machines serve as spam zombies. In such situation, the packets transmitted across the network have to be scanned through sequential scanning process by employing various statistical methodologies. By detecting the spatial temporal behavior using the grouping flow control detection mechanisms, the IDS exploit the malicious behavior of the host machine.
The major problem in the popular IDS systems is the false alarms and raw alerts. In multi step attack conditions, the analysis of false alarms and raw alerts are controlled by alert correlation tools (Chun-Jen Chung et al., 2013). In order to detect flooding DDOS attack, the collaborative tool Firecol is used. The threats in such distributed attacks are measured based on the bandwidth allocation to the users and Firecol attack detection algorithms by means of their mitigation techniques and the virtual rings effectively exploit the intrusion attack and prevent the malicious spreading (Jérôme François et al., 2012).
The rest of this paper is organized as follows: Section 3 deals with the system design and the architectural components of Firegroup. Section 4 shows the implementation procedures and the simulation analysis with results and screenshots. Section 5 shows the conclusion and the future enhancements followed by references in section 6.