SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.21 | ISO 9001:2008 Certified Journal | Page 297
ENHANCING NETWORK SECURITY BY MODIFIED SECURE DYNAMIC
PATH IDENTIFIERS
AlbyAlphonsa Joseph1, Chinju K2, Dr. Vinodh P Vijayan3
1M.Tech Student, Department of Computer Science & Engineering, M G University, Kerala, India
2 Assistant Professor, Department of Computer Science & Engineering, M G University, Kerala, India
3 Associate Professor & Head of the Dept, Department of Computer Science & Engineering, Mangalam College of
Engineering, Kerala, India
--------------------------------------------------------------------***-----------------------------------------------------------------------
ABSTRACT - A Distributed Denial of Service Flooding
attack is the most highlighted and important attacks of
today’s cyber world. It is characterized by an explicit
attempt by an attacker to prevent legitimate users from
using resources. An attacker may attempt to flood a
network and thus reduce a legitimate user’s bandwidth,
prevent access to a service, or disrupt service to a specific
system or a user. Very few users are interests in using path
identifiers to mitigate the DDoS flooding attacks in the
network. Existing PIDs are static and also insecure. To
address the above issue , in this paper we developed the
design, implementation, and evaluation of secure dynamic
path identifiers, a framework that uses dynamic secure
PIDs (MDSPID) verified with every packet to avoid the
DDoS flooding attacks. The experiments and results shows
the proposed system achieved better result in terms of
several QoS parameters.
Keywords:- DDoSFlooding , Secure Dynamic Path
Identifiers, End to End Delay, Level Checking, Packet
Delivery Ratio
1. INTRODUCTION
Internet is confronted with serious security threats and
it is very hard to defense against them due to the open
environment of the Internet. Distributed-Denial-of-
Service (DDoS) attacks pose a grave danger to Internet
operation. They are resource overloading attacks. The
aim of the attacker is to tie up a chosen key resource at
the victim, usually by sending a high volume of
legitimate traffic requesting some service from the
victim. The overconsumption of the resource leads to
degradation or denial of the victim’s service to its
legitimate clients. In the absence of effective defense
mechanisms, the denial of service effect lasts for the
entire duration of the attack and vanishes quickly once
the attack is aborted. Various techniques and algorithmic
protocols are designed and proposed by various authors
for preventing from distributed denial of service attacks.
Many related works have been introduced in order to
protect flooding attacks, containing color, lipsin,
capability based designs, and ingress filtering. Several
path based routing architectures have been proposed. In
[3], the authors proposed pathlet routing, and define
pathlets as fragments of paths that are constructed by
sequences of virtual nodes. It tries to address the
challenges of scalability and multipath routing for
Internet routing, and the results show that the number
of forwarding plane entries of pathlet routing is much
smaller than that of the current BGP routing. LIPSIN [4]
is a novel forwarding fabric based on the
publish/subscribe architecture. It uses Link Ids and in-
packet zFilters to forward packets and benefits from its
simple forwarding decisions and small forwarding
tables, so such system can scale up to metropolitan WAN
sizes. However, both the two frameworks announce the
path identifiers globally. Such feature makes the network
risky for malicious attacks because of two reasons. First :
it is easy for an attacker to directly send malicious
packets to the target since the path identifiers are known
globally .Second : it is difficult to dynamically change the
path identifiers for enhanced security, due to the
foreseeably vast overheads that will be caused by the
notification messages. Disadvantages of existing system
are easy to launch attacks if path identifiers arestatic,
high complexity, less performance, more loss occur and
high overhead. Existing path identifiers are static and
also insecure. To overcome this problem we developed
the design, implementation and evaluation of MDSPID.
Modified secure dynamic path identifier is a framework
that uses modified secure path identifiers verified with
each packet to destory the DDoS flooding and spoofing
attacks.
2. SYSTEM DESIGN
The MDSPID has several steps, where PID generation is
the initial step. The main idea of generating PID is to
dynamically change for inter-domain path. It also hides
the node id in the selected path. For example if the
selected path is A->B->C, then there will be a unique PID
generated and assigned. In DPID, it doesn’t include the
update period. After each transaction the path identifiers
will be updated. So there is a unique PID for each path
after every transaction. This significantly reduces cost by
eliminating time based PID updating. When the PID of
the path changes to new PID based on the time, the
ongoing communications may be interrupted. But this
issue is destroyed in the proposed system. We propose a
timestamp (Ts) mechanism method. The PID generation
time is indexed with the Ts value. Based on these Ts, the
content consumer can authenticate the received GET
message to the network. If the Ts values are verified and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.21 | ISO 9001:2008 Certified Journal | Page 298
transaction is completed, then a new MDSPIDs will be
generated along the path.
2.1 MDSPID Generation
Each path from the origin to the destination has a PID
and each node in the path has its unique anonymous
node id (ANID). A path is uniquely identified for every
transaction by the MDSPID. The MDSPID is generated
per-transaction based on the packet sequence number
(seq) and the ANID .Use a modified Chaskey algorithm to
produce this unique MDSPID and ANID in a secure
manner. Thus for a given data packet for selected path,
the MDSPID of a path representing the node ANID is
computed as,
MDSPIDi= generateMDSPID(ANIDi, seq)= C
ANIDi(seq) where C is the Chaskey block chipper
function.
2.2 Timestamp Formation
Timestamp mechanism helps to detect the actual
MDSPID generation and ANID generation time of each
node in the network. Using the timestamp for MDSPID
and data transmission that no can able to modify or
make forgery, so the path identifiers can never be
spoofed.
Step: 1. create two prime numbers (A) and (B)
Step: 2. selects a random number(r) as private key
Step: 3. C=B xmodA
Step: 4. send [A,B,C] to each nodes Ni
Step: 5. send key C to each node Ni
Step: 6. Append T with C where T is the timestamp
Step: 7. selects a random value (K), and calculates two
new values (x and y):
a. x=BKmodA
b. y=CKDmodA
Step: 8. Verification process
D(verify)=y/( )modA where D is the data
content.
3. ARCHITECTURE
The node 1 sends a request message to node 2. The node
2 will check the identity and the timestamp of its key
value from the detector nodes. The decider and detector
nodes are the centralized domain authority, which will
provide the MDSPID for the requested transaction. The
corresponding nodes will receive the MDSPID, here the
MDSPID is a sequence binary number which has been
created from the nodes anonymous id ANID, so, for every
request, the validation will be performed and the
respective GET message is transmitted to the requestor
node. At the time of next requesting from node 1, the
GET message appends the ANID details in the packet
header. The node 2 will receive the GET message and
validates the MDSPID and previous request id in the
MDSPID index table. So the two levels of verification
allow the node to detect and prevent the DDoS flooding
attacks in the network.
Fig -1: Process Flow Architecture
The MDSPID system is well suitable for the high mobility
and scalable network infrastructure. In case multiple
requests from multiple clients, the requesters are
segregated into high and low priority nodes. This
priority has been given based on the GET message. This
is based on the probability of the attacks from the
network, which the node made requests from.
4. EXPERIMENTAL IMPLEMENTATION
Fig -2: Two Level Checking to resolve DDoS Flooding
Attack
This section evaluate the experimental setup and real
time formation of the DDoS flooding attack in the
wireless network. The prevention and detection
technique of flooding attack is carried out in NS2
simulator with 50 mobile nodes. An efficient technique
MDSPID is proposed to defend against DDoS flooding
attack. This new scheme involves a two level checking of
the client’s request. These are, path-level and
timestamping. The existing solutions to defend against
TCP SYN flood and DDoS attacks involves checking only
the client’s availability, to confirm that the incoming
packet is from a legitimate source. But, this does not
ensure the security feature of non- repudiation. In the
MDSPID scheme, the introduction of time stamping in
the packet will provide security feature of non-
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.21 | ISO 9001:2008 Certified Journal | Page 299
repudiation, which is not available in the existing
schemes. To defend against the DDoS, new proposed
solution of two levels checking process performed very
efficiently .Each domain maintains a resource manager
(RM) used to spread the reachability information of
service identifiers. The blue color circle indicates
resource manager at each domain. The red color
indicates packet flows and acknowledgments of each
domain. And also red line indicates no packet flow
between nodes.Thehexagon green color indicates lure
where the attacker locates. There are several ways for
the attacker to obtains a subgraph of the whole Internet,
and it can freely send packets within the range of this
subgraph. After each transaction, the MDSPID should be
updated. The effectiveness of the proposed scheme can
be evaluated by checking the ANID and its previous
identity at the destination with the PID, if the node id
found in the MDSPID and it is similar to the timestamp
value and table value, then it is a legitimate packet. If the
timestamp value and node identity differs it can be
spoofed packet. Two level checking allow the nodes to
detect and prevent DDoS flooding attack in the network.
5. PERFORMANCE ANALYSIS AND RESULT
Xgraph allows to make graphs and used with ns2 .It
collect statistical data synchronized. The system
performance and its effects are analyzed and compared
when a DDoSflooding attack is launched. The
performance evaluation performed includes the packet
delivery ratio, packet lost and end to end delay.
5.1 Packet Delivery Ratio
Fig -3: Graph for Packet Delivery Ratio
Packet delivery ratio is the ratio of number of packets
delivered to the destination.
Packet delivery ratio = ∑ Number of packet receive /∑
Number of packet send
The greater value of packet delivery ratio means the
better performance of the system.From the graph in Fig-
3, it can be seen that in presence of DDoS attack, the
packet delivery ratio of network drops significantly. Also,
if more than one malicious node is present in the
network, packet delivery ratio further decreases in any
security attack. ModifiedSecurePID provides greater
value of packet delivery ratio compared than DPID.
5.2 Packet Loss
It is the number of packets dropped or lost per unit time
during simulation.
(∑ No. of packets sent - ∑ No. of packets received) /
(Stop Time – Start Time)
Low value of packet loss corresponds to the better
performance of the system.The figure 3 shows the
number of packets dropped during simulation either
because of malicious node or because of wireless nature
of the network. As the number of malicious nodes
increases, the effect of these nodes further increases.
Instead of providing threshold for PID generation, the
proposed system performs the PID generation and
distribution at the end of the transaction. This
distributes the PID only to the participated nodes in the
transaction.
Fig -4: Graph for Packet Loss
5.3 End-to-End Delay
It is the average time taken by a data packet to arrive at
destination from the source. It includes the delay caused
by routing process and the queue in data transmission
process.
End to End Delay = (Arrive time – send time) / ∑
Number of connections
Low value of End-to-End delay corresponds to the better
performance of the protocol. The graph in Fig- 4 shows
average end to end delay present in the transmission of
packet. The results of the simulation show that the end
to end delay keeps on increasing as the number of
attacker nodes are increased in the network. The
attacker nodes present in the network drop the packets
and hence a retransmission is required.
Fig -5: Graph for End-to-End Delay
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.21 | ISO 9001:2008 Certified Journal | Page 300
5.5 Detection Ratio
The detection approaches depends on the nature of data
that is available either from the end-users (source or
victim) or the network.
Fig -6: Graph for Detection Ratio
The end-user information contains the data from TCP
and UDP packets and it is specific to a particular user
application. Various detection approaches are
implemented on either source-end or victim-end. The
graph in Fig- 6 shows that the detection ratio with
respect to number of attackers .It also gives the overall
resource utilization includes the GET message
generation, verification and authentication. This graph
compares the detection accuracy of the proposed
MDSPID with timestamp scheme and the existing
detection schemes such as the DPID.
In each trial, among the total number of packets, the
number of legitimate and attack packets have equal
weightage. As the proposed scheme is efficiently
designed to detect and prevent the DDoS flooding
attacks using system anomaly and traceback methods,
when compared to the existing schemes, it shows
improved detection accuracy. Though the number of
packets increased, the proposed scheme shows 98.09%,
96.12% ,93.39% , 91.88 and 89.87 improvement in
detection accuracy. This compares the results of
detecting and preventing DDoS flooding attacks,
spoofing and forgery attacks over the existing schemes.
As the existing system do not follow the traceback
detection scheme, their detection accuracy level is
reduced over the proposed scheme. The results show the
accuracy is increased when comparing with the earlier
schemes.
6. CONCLUSION
Internet is confronted with serious security threats
and it is very hard to defense against them due to the
open environment of the Internet. In this paper, we have
proposed a MDSPID mechanism to protect the network
security. The attacker always aim to flood more packets
and make DDoS attacks, this creates many issues like
resource wastage, content delivery issues, malicious
traffic etc. DDoS is the type of attack, which creates many
issues which are difficult to solve. So there is a need to
secure the network with optimal solution to thwart
many attacks. To achieve this, the MDSPID system
developed a new prototype which detects, mitigates and
resolves the DDoS flooding, spoofing and PID forgery
attacks. Path level and node level with timestamping
allows two level verification of the requested data. This
ensures authentication, anonymization and verification
of the node and path identifiers. The results shows the
proposed system achieved better result in terms of
several quality of service parameters.
7. ACKNOWLEDGEMENT
It gives me great pleasure to deliver sincere thanks to
my project guide Prof.Dr.Vinodh P Vijayan, Prof. Chinju K
for their valuable guidance, constant encouragement and
support. I appeal thanks to all the authors of the
referenced papers as they help me and motivate me to
work on this emerged area. Last but not least, I would
like to deliver thanks to my family members, my
colleague, and the people who directly or indirectly
support me in this project work.
8. REFERENCES
[1] H. Luo, Z. Chen, J. Li, and A. V. Vasilakos, “Preventing
distributed denial-of-service flooding attacks with
dynamic path identifiers,” IEEE Transactions on
Information Forensics and Security, vol. 12, issue 8, pp.
1801–1815, 2017.
[2] H. Luo, Z. Chen, J. Cui, H. Zhang, M. Zukerman, C. Qiao,
“CoLoR: an information-centric internet architecture for
innovations,” IEEE Network,vol. 28, no. 3, pp. 4 - 10, May
2014.
[3] P. B. Godfrey, I. Ganichev, S. Shenker, and I. Stoica,
“Pathlet routing,” in Proc. SIGCOMM’09, Barcelona,
Spain, pp. 111 – 122, Aug. 2009.
[4] Jokela, A. Zahemszky, C. E. Rothenberg, S. Arianfar, P.
Nikander,“LIPSIN: Line Speed Publish/Subscribe Inter-
networking,” in Proc.SIGCOMM’09, Barcelona, Spain, pp.
195 – 206, Aug. 2009.
[5] S. T. Zargar, J. Joshi, D. Tipper, “A Survey of
DefenseMechanismsAgainst Distributed Denial of
Service (DDoS) Flooding Attacks,” IEEE Commun. Surv.
&Tut., vol. 15, no. 4, pp. 2046 - 2069, Nov. 2013.
[6] S. Savage, D. Wetherall, A. Karlin, and T. Anderson,
“Practical Network Support for IP Traceback,” In Proc.
SIGCOMM’00, Stockholm, Sweden ,Aug. 2000 .
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.21 | ISO 9001:2008 Certified Journal | Page 301
[7] P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, “DoS&DDoS
in named-data networking,” in Proc. IEEE ICCCN’13 ,
Nassau, Bahama, Aug. 2013.
[8] Z. Chen, H. Luo, M. Zhang, J. Li, “Improving network
security by dynamically changing path identifiers in
future Internet,” in Proc. IEEE GLOBECOM’15, San Diego,
CA, USA, Dec. 2015.
[9] N Mouha, BMennink, A Van Herrewege, D Watanabe,
B Preneel, and I Verbauwhede. "Chaskey: an efficient
MAC algorithm for 32-bit microcontrollers." In
International Workshop on Selected Areas in
Cryptography, pp. 306-323. Springer, Cham, 2014.
BIOGRAPHY
Alby Alphonsa Joseph. I have
completed Bachelors in
Computer Science &
Engineering (BTech-CSE)
from LMCST College, Kerala
University and currently
pursuing masters (MTech) in
Computer Science &
Engineering from School of
Computer Sciences, Mahatma
University. My research
interests are Cloud computing, Database technologies,
Network Security, Software Engineering.

More Related Content

PDF
IRJET- Survey on Mitigation Techniques of Economical Denial of Sustainabi...
PDF
561 1530-1-pb (1)
PPTX
Binary Hash Tree based Certificate Access Management for Connected Vehicles (...
PDF
IRJET- Secure Kerberos System in Distributed Environment
PDF
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
PDF
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
PDF
Rfc3413
PDF
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
IRJET- Survey on Mitigation Techniques of Economical Denial of Sustainabi...
561 1530-1-pb (1)
Binary Hash Tree based Certificate Access Management for Connected Vehicles (...
IRJET- Secure Kerberos System in Distributed Environment
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
Rfc3413
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...

What's hot (20)

PDF
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
PDF
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
PDF
Performance Analysis of Wireless Trusted Software Defined Networks
PDF
International Journal of Engineering and Science Invention (IJESI)
PDF
Guillou-quisquater protocol for user authentication based on zero knowledge p...
PDF
IS Unit 7_Network Security
PDF
IRJET- A Survey on DDOS Attack in Manet
PDF
Novel Method to Overcome Vulnerability in Wi-Fi Network
PDF
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
PDF
Stm
 
PDF
IRJET- Anchoring of Cloud Information under Key Presentation
PDF
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
PPT
Ip Guardian customer presentation
PDF
Malware Narratives
PDF
1 s2.0-s1877050915013460-main
PDF
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
PDF
IRJET- Study of Blockchain and its Concepts
PDF
Reactive Data Centric Architectures with DDS
PDF
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
PDF
Certificate less key management scheme in
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
Performance Analysis of Wireless Trusted Software Defined Networks
International Journal of Engineering and Science Invention (IJESI)
Guillou-quisquater protocol for user authentication based on zero knowledge p...
IS Unit 7_Network Security
IRJET- A Survey on DDOS Attack in Manet
Novel Method to Overcome Vulnerability in Wi-Fi Network
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Stm
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
Ip Guardian customer presentation
Malware Narratives
1 s2.0-s1877050915013460-main
IRJET- DDOS Detection System using C4.5 Decision Tree Algorithm
IRJET- Study of Blockchain and its Concepts
Reactive Data Centric Architectures with DDS
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
Certificate less key management scheme in
Ad

Similar to IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers (20)

PDF
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
PDF
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
PDF
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
PDF
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
PDF
How prevent dos
DOC
Detection of application layer ddos attack using hidden semi markov model (20...
PDF
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
PDF
A Survey on Data Intrusion schemes used in MANET
PDF
Implementation of ICMP flood detection and mitigation system based on softwar...
PDF
1426742816
DOCX
Packet%20marking%20report
PDF
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
PDF
call for papers, research paper publishing, where to publish research paper, ...
PDF
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DOC
Efficient packet marking for large scale ip trace back(synopsis)
DOCX
ITSecurity_DDOS_Mitigation
PDF
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
PDF
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
PDF
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
How prevent dos
Detection of application layer ddos attack using hidden semi markov model (20...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A Survey on Data Intrusion schemes used in MANET
Implementation of ICMP flood detection and mitigation system based on softwar...
1426742816
Packet%20marking%20report
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
call for papers, research paper publishing, where to publish research paper, ...
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
Efficient packet marking for large scale ip trace back(synopsis)
ITSecurity_DDOS_Mitigation
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
bas. eng. economics group 4 presentation 1.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
composite construction of structures.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Digital Logic Computer Design lecture notes
PPT
Project quality management in manufacturing
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
additive manufacturing of ss316l using mig welding
bas. eng. economics group 4 presentation 1.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
composite construction of structures.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Lecture Notes Electrical Wiring System Components
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Geodesy 1.pptx...............................................
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Sustainable Sites - Green Building Construction
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Digital Logic Computer Design lecture notes
Project quality management in manufacturing
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
additive manufacturing of ss316l using mig welding

IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.21 | ISO 9001:2008 Certified Journal | Page 297 ENHANCING NETWORK SECURITY BY MODIFIED SECURE DYNAMIC PATH IDENTIFIERS AlbyAlphonsa Joseph1, Chinju K2, Dr. Vinodh P Vijayan3 1M.Tech Student, Department of Computer Science & Engineering, M G University, Kerala, India 2 Assistant Professor, Department of Computer Science & Engineering, M G University, Kerala, India 3 Associate Professor & Head of the Dept, Department of Computer Science & Engineering, Mangalam College of Engineering, Kerala, India --------------------------------------------------------------------***----------------------------------------------------------------------- ABSTRACT - A Distributed Denial of Service Flooding attack is the most highlighted and important attacks of today’s cyber world. It is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources. An attacker may attempt to flood a network and thus reduce a legitimate user’s bandwidth, prevent access to a service, or disrupt service to a specific system or a user. Very few users are interests in using path identifiers to mitigate the DDoS flooding attacks in the network. Existing PIDs are static and also insecure. To address the above issue , in this paper we developed the design, implementation, and evaluation of secure dynamic path identifiers, a framework that uses dynamic secure PIDs (MDSPID) verified with every packet to avoid the DDoS flooding attacks. The experiments and results shows the proposed system achieved better result in terms of several QoS parameters. Keywords:- DDoSFlooding , Secure Dynamic Path Identifiers, End to End Delay, Level Checking, Packet Delivery Ratio 1. INTRODUCTION Internet is confronted with serious security threats and it is very hard to defense against them due to the open environment of the Internet. Distributed-Denial-of- Service (DDoS) attacks pose a grave danger to Internet operation. They are resource overloading attacks. The aim of the attacker is to tie up a chosen key resource at the victim, usually by sending a high volume of legitimate traffic requesting some service from the victim. The overconsumption of the resource leads to degradation or denial of the victim’s service to its legitimate clients. In the absence of effective defense mechanisms, the denial of service effect lasts for the entire duration of the attack and vanishes quickly once the attack is aborted. Various techniques and algorithmic protocols are designed and proposed by various authors for preventing from distributed denial of service attacks. Many related works have been introduced in order to protect flooding attacks, containing color, lipsin, capability based designs, and ingress filtering. Several path based routing architectures have been proposed. In [3], the authors proposed pathlet routing, and define pathlets as fragments of paths that are constructed by sequences of virtual nodes. It tries to address the challenges of scalability and multipath routing for Internet routing, and the results show that the number of forwarding plane entries of pathlet routing is much smaller than that of the current BGP routing. LIPSIN [4] is a novel forwarding fabric based on the publish/subscribe architecture. It uses Link Ids and in- packet zFilters to forward packets and benefits from its simple forwarding decisions and small forwarding tables, so such system can scale up to metropolitan WAN sizes. However, both the two frameworks announce the path identifiers globally. Such feature makes the network risky for malicious attacks because of two reasons. First : it is easy for an attacker to directly send malicious packets to the target since the path identifiers are known globally .Second : it is difficult to dynamically change the path identifiers for enhanced security, due to the foreseeably vast overheads that will be caused by the notification messages. Disadvantages of existing system are easy to launch attacks if path identifiers arestatic, high complexity, less performance, more loss occur and high overhead. Existing path identifiers are static and also insecure. To overcome this problem we developed the design, implementation and evaluation of MDSPID. Modified secure dynamic path identifier is a framework that uses modified secure path identifiers verified with each packet to destory the DDoS flooding and spoofing attacks. 2. SYSTEM DESIGN The MDSPID has several steps, where PID generation is the initial step. The main idea of generating PID is to dynamically change for inter-domain path. It also hides the node id in the selected path. For example if the selected path is A->B->C, then there will be a unique PID generated and assigned. In DPID, it doesn’t include the update period. After each transaction the path identifiers will be updated. So there is a unique PID for each path after every transaction. This significantly reduces cost by eliminating time based PID updating. When the PID of the path changes to new PID based on the time, the ongoing communications may be interrupted. But this issue is destroyed in the proposed system. We propose a timestamp (Ts) mechanism method. The PID generation time is indexed with the Ts value. Based on these Ts, the content consumer can authenticate the received GET message to the network. If the Ts values are verified and
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.21 | ISO 9001:2008 Certified Journal | Page 298 transaction is completed, then a new MDSPIDs will be generated along the path. 2.1 MDSPID Generation Each path from the origin to the destination has a PID and each node in the path has its unique anonymous node id (ANID). A path is uniquely identified for every transaction by the MDSPID. The MDSPID is generated per-transaction based on the packet sequence number (seq) and the ANID .Use a modified Chaskey algorithm to produce this unique MDSPID and ANID in a secure manner. Thus for a given data packet for selected path, the MDSPID of a path representing the node ANID is computed as, MDSPIDi= generateMDSPID(ANIDi, seq)= C ANIDi(seq) where C is the Chaskey block chipper function. 2.2 Timestamp Formation Timestamp mechanism helps to detect the actual MDSPID generation and ANID generation time of each node in the network. Using the timestamp for MDSPID and data transmission that no can able to modify or make forgery, so the path identifiers can never be spoofed. Step: 1. create two prime numbers (A) and (B) Step: 2. selects a random number(r) as private key Step: 3. C=B xmodA Step: 4. send [A,B,C] to each nodes Ni Step: 5. send key C to each node Ni Step: 6. Append T with C where T is the timestamp Step: 7. selects a random value (K), and calculates two new values (x and y): a. x=BKmodA b. y=CKDmodA Step: 8. Verification process D(verify)=y/( )modA where D is the data content. 3. ARCHITECTURE The node 1 sends a request message to node 2. The node 2 will check the identity and the timestamp of its key value from the detector nodes. The decider and detector nodes are the centralized domain authority, which will provide the MDSPID for the requested transaction. The corresponding nodes will receive the MDSPID, here the MDSPID is a sequence binary number which has been created from the nodes anonymous id ANID, so, for every request, the validation will be performed and the respective GET message is transmitted to the requestor node. At the time of next requesting from node 1, the GET message appends the ANID details in the packet header. The node 2 will receive the GET message and validates the MDSPID and previous request id in the MDSPID index table. So the two levels of verification allow the node to detect and prevent the DDoS flooding attacks in the network. Fig -1: Process Flow Architecture The MDSPID system is well suitable for the high mobility and scalable network infrastructure. In case multiple requests from multiple clients, the requesters are segregated into high and low priority nodes. This priority has been given based on the GET message. This is based on the probability of the attacks from the network, which the node made requests from. 4. EXPERIMENTAL IMPLEMENTATION Fig -2: Two Level Checking to resolve DDoS Flooding Attack This section evaluate the experimental setup and real time formation of the DDoS flooding attack in the wireless network. The prevention and detection technique of flooding attack is carried out in NS2 simulator with 50 mobile nodes. An efficient technique MDSPID is proposed to defend against DDoS flooding attack. This new scheme involves a two level checking of the client’s request. These are, path-level and timestamping. The existing solutions to defend against TCP SYN flood and DDoS attacks involves checking only the client’s availability, to confirm that the incoming packet is from a legitimate source. But, this does not ensure the security feature of non- repudiation. In the MDSPID scheme, the introduction of time stamping in the packet will provide security feature of non-
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.21 | ISO 9001:2008 Certified Journal | Page 299 repudiation, which is not available in the existing schemes. To defend against the DDoS, new proposed solution of two levels checking process performed very efficiently .Each domain maintains a resource manager (RM) used to spread the reachability information of service identifiers. The blue color circle indicates resource manager at each domain. The red color indicates packet flows and acknowledgments of each domain. And also red line indicates no packet flow between nodes.Thehexagon green color indicates lure where the attacker locates. There are several ways for the attacker to obtains a subgraph of the whole Internet, and it can freely send packets within the range of this subgraph. After each transaction, the MDSPID should be updated. The effectiveness of the proposed scheme can be evaluated by checking the ANID and its previous identity at the destination with the PID, if the node id found in the MDSPID and it is similar to the timestamp value and table value, then it is a legitimate packet. If the timestamp value and node identity differs it can be spoofed packet. Two level checking allow the nodes to detect and prevent DDoS flooding attack in the network. 5. PERFORMANCE ANALYSIS AND RESULT Xgraph allows to make graphs and used with ns2 .It collect statistical data synchronized. The system performance and its effects are analyzed and compared when a DDoSflooding attack is launched. The performance evaluation performed includes the packet delivery ratio, packet lost and end to end delay. 5.1 Packet Delivery Ratio Fig -3: Graph for Packet Delivery Ratio Packet delivery ratio is the ratio of number of packets delivered to the destination. Packet delivery ratio = ∑ Number of packet receive /∑ Number of packet send The greater value of packet delivery ratio means the better performance of the system.From the graph in Fig- 3, it can be seen that in presence of DDoS attack, the packet delivery ratio of network drops significantly. Also, if more than one malicious node is present in the network, packet delivery ratio further decreases in any security attack. ModifiedSecurePID provides greater value of packet delivery ratio compared than DPID. 5.2 Packet Loss It is the number of packets dropped or lost per unit time during simulation. (∑ No. of packets sent - ∑ No. of packets received) / (Stop Time – Start Time) Low value of packet loss corresponds to the better performance of the system.The figure 3 shows the number of packets dropped during simulation either because of malicious node or because of wireless nature of the network. As the number of malicious nodes increases, the effect of these nodes further increases. Instead of providing threshold for PID generation, the proposed system performs the PID generation and distribution at the end of the transaction. This distributes the PID only to the participated nodes in the transaction. Fig -4: Graph for Packet Loss 5.3 End-to-End Delay It is the average time taken by a data packet to arrive at destination from the source. It includes the delay caused by routing process and the queue in data transmission process. End to End Delay = (Arrive time – send time) / ∑ Number of connections Low value of End-to-End delay corresponds to the better performance of the protocol. The graph in Fig- 4 shows average end to end delay present in the transmission of packet. The results of the simulation show that the end to end delay keeps on increasing as the number of attacker nodes are increased in the network. The attacker nodes present in the network drop the packets and hence a retransmission is required. Fig -5: Graph for End-to-End Delay
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.21 | ISO 9001:2008 Certified Journal | Page 300 5.5 Detection Ratio The detection approaches depends on the nature of data that is available either from the end-users (source or victim) or the network. Fig -6: Graph for Detection Ratio The end-user information contains the data from TCP and UDP packets and it is specific to a particular user application. Various detection approaches are implemented on either source-end or victim-end. The graph in Fig- 6 shows that the detection ratio with respect to number of attackers .It also gives the overall resource utilization includes the GET message generation, verification and authentication. This graph compares the detection accuracy of the proposed MDSPID with timestamp scheme and the existing detection schemes such as the DPID. In each trial, among the total number of packets, the number of legitimate and attack packets have equal weightage. As the proposed scheme is efficiently designed to detect and prevent the DDoS flooding attacks using system anomaly and traceback methods, when compared to the existing schemes, it shows improved detection accuracy. Though the number of packets increased, the proposed scheme shows 98.09%, 96.12% ,93.39% , 91.88 and 89.87 improvement in detection accuracy. This compares the results of detecting and preventing DDoS flooding attacks, spoofing and forgery attacks over the existing schemes. As the existing system do not follow the traceback detection scheme, their detection accuracy level is reduced over the proposed scheme. The results show the accuracy is increased when comparing with the earlier schemes. 6. CONCLUSION Internet is confronted with serious security threats and it is very hard to defense against them due to the open environment of the Internet. In this paper, we have proposed a MDSPID mechanism to protect the network security. The attacker always aim to flood more packets and make DDoS attacks, this creates many issues like resource wastage, content delivery issues, malicious traffic etc. DDoS is the type of attack, which creates many issues which are difficult to solve. So there is a need to secure the network with optimal solution to thwart many attacks. To achieve this, the MDSPID system developed a new prototype which detects, mitigates and resolves the DDoS flooding, spoofing and PID forgery attacks. Path level and node level with timestamping allows two level verification of the requested data. This ensures authentication, anonymization and verification of the node and path identifiers. The results shows the proposed system achieved better result in terms of several quality of service parameters. 7. ACKNOWLEDGEMENT It gives me great pleasure to deliver sincere thanks to my project guide Prof.Dr.Vinodh P Vijayan, Prof. Chinju K for their valuable guidance, constant encouragement and support. I appeal thanks to all the authors of the referenced papers as they help me and motivate me to work on this emerged area. Last but not least, I would like to deliver thanks to my family members, my colleague, and the people who directly or indirectly support me in this project work. 8. REFERENCES [1] H. Luo, Z. Chen, J. Li, and A. V. Vasilakos, “Preventing distributed denial-of-service flooding attacks with dynamic path identifiers,” IEEE Transactions on Information Forensics and Security, vol. 12, issue 8, pp. 1801–1815, 2017. [2] H. Luo, Z. Chen, J. Cui, H. Zhang, M. Zukerman, C. Qiao, “CoLoR: an information-centric internet architecture for innovations,” IEEE Network,vol. 28, no. 3, pp. 4 - 10, May 2014. [3] P. B. Godfrey, I. Ganichev, S. Shenker, and I. Stoica, “Pathlet routing,” in Proc. SIGCOMM’09, Barcelona, Spain, pp. 111 – 122, Aug. 2009. [4] Jokela, A. Zahemszky, C. E. Rothenberg, S. Arianfar, P. Nikander,“LIPSIN: Line Speed Publish/Subscribe Inter- networking,” in Proc.SIGCOMM’09, Barcelona, Spain, pp. 195 – 206, Aug. 2009. [5] S. T. Zargar, J. Joshi, D. Tipper, “A Survey of DefenseMechanismsAgainst Distributed Denial of Service (DDoS) Flooding Attacks,” IEEE Commun. Surv. &Tut., vol. 15, no. 4, pp. 2046 - 2069, Nov. 2013. [6] S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Practical Network Support for IP Traceback,” In Proc. SIGCOMM’00, Stockholm, Sweden ,Aug. 2000 .
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.21 | ISO 9001:2008 Certified Journal | Page 301 [7] P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, “DoS&DDoS in named-data networking,” in Proc. IEEE ICCCN’13 , Nassau, Bahama, Aug. 2013. [8] Z. Chen, H. Luo, M. Zhang, J. Li, “Improving network security by dynamically changing path identifiers in future Internet,” in Proc. IEEE GLOBECOM’15, San Diego, CA, USA, Dec. 2015. [9] N Mouha, BMennink, A Van Herrewege, D Watanabe, B Preneel, and I Verbauwhede. "Chaskey: an efficient MAC algorithm for 32-bit microcontrollers." In International Workshop on Selected Areas in Cryptography, pp. 306-323. Springer, Cham, 2014. BIOGRAPHY Alby Alphonsa Joseph. I have completed Bachelors in Computer Science & Engineering (BTech-CSE) from LMCST College, Kerala University and currently pursuing masters (MTech) in Computer Science & Engineering from School of Computer Sciences, Mahatma University. My research interests are Cloud computing, Database technologies, Network Security, Software Engineering.