EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 6

Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS

journal image
 Download
1289
  • Ashish Kumar and Ajay K Sharma and Arun Singh 2012. Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS. International Journal of Applied Information Systems. 4, 6 (December 2012), 1-6. DOI=http://dx.doi.org/10.5120/ijais450106
  • @article{10.5120/ijais2017451568,
    author = {Ashish Kumar and Ajay K Sharma and Arun Singh},
    title = {Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS},
    journal = {International Journal of Applied Information Systems},
    issue_date = {December 2012},
    volume = {4},
    number = {},
    month = {December},
    year = {2012},
    issn = {},
    pages = {1-6},
    numpages = {},
    url = {/archives/volume4/number6/359-0106},
    doi = { 10.5120/ijais12-450106},
    publisher = { xA9 2012 by IJAIS Journal},
    address = {}
    }
    
  • %1 450106
    %A Ashish Kumar
    %A Ajay K Sharma
    %A Arun Singh
    %T Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS
    %J International Journal of Applied Information Systems
    %@ 
    %V 4
    %N 
    %P 1-6
    %D 2012
    %I  xA9 2012 by IJAIS Journal
    

Abstract

The Paper evaluates the performance of Distance Vector Multicast Routing Protocol (DVMRP) Multicasting Network with two sources and four receivers, attack by five attackers. Attackers attacked the source 1 in network by ICMP Ping Flood. Here we execute the simulation and draw network throughput between source 1 and source 2, queuing transmission delay and drop out data packets at source 1 for ping packet of size 16, 64 and 96 Bytes for 500, 1500 and 2500 ping packets per second. The simulation results indicate that throughput decreases with the increase in attack packet size and intensity, delay increases with increase in attack packet size and decrease with increase in attacking intensity. Also, with the increase in attack packet size the number of dropped packets remain nearly same for different intensities.

References

  1. Monika Sachdeva, Krishan Kumar, Gurvinder Singh, Kuldip Singh, "Performance Analysis of Web Service under DDoS Attacks", 2009 IEEE International Advance Computing Conference (IACC 2009) Patiala, India, 6-7 March 2009.
  2. J. Mirkovic, D-WARD: Source-End Defense Against Distributed Denial-of-service Attacks, Ph. D. Thesis, University of California, Los Angeles, 2003.
  3. J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communications Review, Volume 34, Issue 2, pp. 39-53, April, 2004.
  4. R. K. C. Chang, "Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial," IEEE Communication Magazine, pp. 42-51, 2002.
  5. Ping Flooding, can be found at: http://tomicki. net/ping. flooding. php
  6. Ping Flood (ICMP Echo) Detection, Can be found at: http://www. daxnetworks. com/Technology/TechDost/TD-101304-Ping%20Flood(ICMP%20Echo)%20Detection. pdf
  7. The ns Manual (formerly ns Notes and Documentation), The VINT Project A Collaboration between researchers at UC Berkeley, LBL, USC/ISI, and Xerox PARC. Kevin Fall hkfall@ee. lbl. govi, Editor Kannan Varadhan hkannan@catarina. usc. edui, Editor, May 9, 2010, page no 73.
  8. Multicasting White paper ,Allied Telesis,Can be found at http://www. alliedtelesis. com/media/pdf/multicasting_wp. pdf
  9. Arash Dana and Ahmad Malekloo,"Performance Comparison between Active and Passive Queue Management" ,IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No5, May 2010
  10. Distributed Denial of Service (DDoS),can be found at http://www. cert. org/homeusers/ddos. html
  11. Shigang Chen, Member,IEEE, and Qingguo Song, (2005), Perimeter– based Defense against Bandwith DDoS Attacks, IEEE Transactions on parallel and Distributed systems, Vol. 16,No. 6, Digital Object Identifier: 10. 1109/TPDS. 2005. 74.
  12. S. Gavaskar, R. Surendiran, Dr. E. Ramaraj, "Three Counter Defense Mechanism for TCP SYN Flooding Attacks", International Journal of Computer Applications (0975 – 8887) Volume 6– No. 6, September 2010.
  13. Christos Douligeris, Aikaterini Mitrokotsa, "DDoS attacks and defense mechanisms: classification and state-of-the-art", Elsevier, Computer Networks 44 (2004) 643–666.
  14. P. J. Criscuolo, Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319, Department of Energy Computer Incident Advisory (CIAC), UCRL-ID-136939, Rev. 1, Lawrence Livermore National Laboratory, February 14, 2000, Available from .

Keywords

DVMRP, Drop Tail, DDoS, PING Flood, Data Multicasting, NS2

Index Terms

Computer Science
Information Sciences