Reference Hub6
Security Integration in DDoS Attack Mitigation Using Access Control Lists

Security Integration in DDoS Attack Mitigation Using Access Control Lists

Sumit Kumar Yadav, Kavita Sharma, Arushi Arora
Copyright: © 2018 |Volume: 9 |Issue: 1 |Pages: 21
ISSN: 1947-8186|EISSN: 1947-8194|EISBN13: 9781522545088|DOI: 10.4018/IJISMD.2018010103
Cite Article Cite Article

MLA

Yadav, Sumit Kumar, et al. "Security Integration in DDoS Attack Mitigation Using Access Control Lists." IJISMD vol.9, no.1 2018: pp.56-76. http://doi.org/10.4018/IJISMD.2018010103

APA

Yadav, S. K., Sharma, K., & Arora, A. (2018). Security Integration in DDoS Attack Mitigation Using Access Control Lists. International Journal of Information System Modeling and Design (IJISMD), 9(1), 56-76. http://doi.org/10.4018/IJISMD.2018010103

Chicago

Yadav, Sumit Kumar, Kavita Sharma, and Arushi Arora. "Security Integration in DDoS Attack Mitigation Using Access Control Lists," International Journal of Information System Modeling and Design (IJISMD) 9, no.1: 56-76. http://doi.org/10.4018/IJISMD.2018010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this article, the authors propose a DDoS mitigation system through access list-based configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to prohibit DDoS attacks over ISPs' networks traffic. The effectiveness of the proposed system relies heavily on the willingness of ISPs in implementing the system. Once each ISP implements the system, most attacks can easily be stopped close to their point of origin. The main challenge is to implement such a system with the fixed amount of memory and available processing power with routers. A coordinated effort by participating ISPs filters out attacks close to their source, reducing the load on other routers. The suspicious traffic is first filtered out based on their source IP address. The authors also implemented the WRED algorithm for their case and conduct GNS3 experiments in a simulated environment.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.