SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014
DOI:10.5121/ijcsa.2014.4607 79
Quantifying the Impact of Flood Attack on
Transport Layer Protocol
KULDEEP TOMAR
1
AND S.S TYAGI
2
1
Research Scholar, Department of CSE, MRIU, Faridabad, Haryana, India
2
Professor & Head, Department of CSE, MRIU, Faridabad, Haryana, India
ABSTRACT
As growth of internet and computer increase day by day so as the growth of attacks on network is also
tremendously increased day by day. In this paper we introduced a wired network and create two TCP
source node and one attacker node (Distributed denial-of-service) flooding type attack which is the attack
on the bandwidth of TCP node at source side sends data to destination through router and also measure the
impact of Denial-of-service attack (DoS) on that wired network how packets of other source nodes and that
node will drop down due to the impact of flooding type denial-of-service attack and shows the result using
NS-2 NAM & Xgraph windows in simulation.
Keywords
CBR, DoS, DDoS, NAM, TCP, Wired Network .
1.INTRODUCTION
In Today’s world, network security is major concern in computer network. There are so many
attackers who spoof the important information and misused that information through these kinds
of attacks on network attackers spoof the information. Denial-of-service is not only the issue in
the internet but rather it changes the mandatory or required information when there would be
slight change in the protocols. The emergence of Distributed denial-of-service exists in the base
of the Internet architecture [1] and there are so many methods through which we will detect the
DDoS attack as in [2][3]. There are following types of attacks that come against the infrastructure
of Internet.
• Attack against TCP/IP
• Attack against DNS
• Attack against Border gateway protocol
And there are some attacks that comes under the wired network
• Denial of Service Attack
• Modify the information
• Escalation
• Destruct the data
• Disclosure
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014
80
In this paper we introduce the DDoS attack (Distributed denial-of-service) called Flooding type
Attack which is on the bandwidth of the network. Denial of service attack divided in following
three categories:
• Flooding type Attack
• Protocol Attack
• Logical Attack
We consider the attack on bandwidth introduced on the wired network and measure or calculate
the impact of flooding DDoS attack on the TCP protocol. We experimentally show the result of
flooding attack by network simulator NS-2. In which change the bandwidth range and the result is
shown as packets will drop down at the node 3 called router node r1.
In Transport layer TCP and UDP are the two protocols on which impact measured. We consider
the TCP protocol and measure the performance of TCP protocol by Xgraph and NAM output
files. As we know the TCP is connection oriented protocol and every time before packet sends to
destination the connection would established.
2.BACKGROUND AND RELATED WORK
There are following comparative study and experiments implemented on TCP and UDP
protocols, detecting denial-of-service flooding type attack on TCP & UDP. In this we analyse the
quantitative description of flood type on the bandwidth & its results on packets drop other source
nodes at router. In [4] we analyse the study on transport layer as now we study application layer
protocol with the traffic CBR, Expo, ftp etc. as we recognize DDoS is single most important
threats for the recent Internet as of its ability to generate a enormous volume of redundant or not
needed(unwanted) traffic[5].however the number of techniques have been anticipated to conquer
denial–of-service attacks in Distributed Peer-to-peer networks, it is still extremely inflexible to
react to the flood based DDoS attacks due to a huge number of attacking technology and make
use of this type of technology to spoof the source- address. A well-organized structure has been
considered to detect and defend from the Distributed denial-of-service attacks in Peer-to-Peer
networks. It prevent against these type of threats or attacks by allowing to maintain the distance
among source and the dupe end [6].In the following category of threat, an attacker attempt to
avoid the use or release of a valuable resource to their intentional viewers or clients. It may be
implemented by the use of various methods, in reality and on computer device. For example, any
attacker can disallow everyone to access telephone systems by cutting down the main telecom
wire from a building, by repetitively calling each accessible phone line, or by distort their PBX
[7]. Up to now we understand the work of malicious node[8] on wired network and on transport
layer now we study the effect of malicious node that attacker node on wireless network also as in
[9][10][11] attacker node affect the zone or on wireless network area. There is also a protocol
which works as defender in DDoS [12].
3.EXPERIMENTAL ANALYSIS
In this paper our work is on the TCP protocol and we implement the result with 4 type of traffic
(CBR, FTP, Preto and Exponential) as architecture shown in fig. 1 below:
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014
81
Figure.1 Architecture of Wired Network with Attacker node
In this architecture 2 nodes called as a user node (TCP node) S1, S3 in network and S2 is attacker
node (TCP Node) which will affect the both source node s1, s3 called 0, 2 and s2 is attacker node
1 and r1 is router node called 3 and d1 is destination node called 4 in the fig.2 and results shows
the performance of each traffic on the TCP by the bandwidth. Data sends from node0 is 0.2 MB
so only 20% data is send from node0 to r1 and 55% data sends from node1 attacker node to r1 so
that traffic will affect the node0, node2 so the packets from node0,node2 will be drop down due
to attacker node traffic. Node2 sends 45% traffic to r1, and r1 sends 20% data to d1, as shown in
results.
In TCP/IP the TCP is transport layer protocol in which attaches the traffics to TCP node and
algorithm is shown as:
1. Create a Simulator
set st[new Simulator]
2. Select the colors
$st color 0 red
$st color 1 green
$st color 2 blue
3. Set the shape
$ no Shape”circle”
$ no Color”black”
Same for n1, n2, n3, n4
4. Set the three output files as f_name as f0,f1,f2
5. Create the five nodes as
set n0 [$st node]
set n1 [$s tnode]
set n2 [$st node]
set n3 [$st node]
set n4 [$st node]
6. Create the duplex/simplex link between the nodes as source node n0 to router n3 and
attach the delay and bandwidth in the queue(RED/DropTail) as set the data %
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014
82
$st duplex-link $n0 $n3 0.2 Mb 100ms
DropTail
# set the Attacker node as means 55% data send from attacker node
$st duplex-link $n1 $n3 0.55Mb 200ms
DropTail
$st duplex-link $n2 $n3 0.45Mb 300ms
DropTail
$st duplex-link $n3 $n4 0.8Mb 100ms
DropTail
#For creating TCP Agent steps are
7. set tcp1 [new Agent/TCP]
8. $st attach-agent $node $tcp1
9. $tcp1 set class_ 2
10. set sink1[newAgent/TCPSink]
11. $st attach-agent $n4 $sink
12. #Connect the traffic ( CBR/ Expo/ Preto/ftp) source with the traffic sink
13. $st connect $tcp $sink1
14. $tcp1 set fid_ 1
15. #Following steps are the parameters of CBR
#Setup a CBR over TCP connection for node n0, n1, n2
Set cbr1as [new Application/Traffic/CBR]
$cbr1 attach-agent $tcp1
15.1 #Parameters of CBR
$cbr1 firstly set type of traffic as set type then
$cbr1 set packet_size
$cbr1 set rate
$cbr1 set random
#And for exponential traffic parameters steps are:
#Setup a Exponential over TCP connection for node n0
set exp0 [ new Application / Traffic/ Exponential ]
15.2 #parameters of expo traffic are
$exp0 attach-agent
$exp0 set packet_size
$exp0 set burst_time
$exp0 set idle_time
$exp0 set rate
#And for FTP traffic parameters steps are:
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014
83
#Setup a FTP over TCP connection for node n0
set ftp [new Application/FTP]
15.3 #parameters of ftp are
$ftp attach-agent $tcp1
$ftp set type_ FTP
16. Then record the procedure for bandwidth.
Figure.2 Architecture of 5 nodes
Fig. 2 represents the 5 nodes wired scenario in which packets send from s0 i.e. 0 to r1 (router) i.e.
3 and through the router to d1 i.e. 4 at that time packets send by only S0 and no data sends from
S1 i.e. the attacker node so no data will drop at r1. As and in fig. 3 represents the packets will
drop down due to S1 sends packet to r1 so the packets of S0 and S3 are drop down.
Figure.3 Packets Drop of node0 and node2 due to node1
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014
84
Even also the Effect of this attacker node, S1 will also drop the packets at some time in the
Network as shown in Fig. 4.
Figure.4 Packets of node1 also drop down at r1
Now the results analysis is shown by the graph at which time packets will drop down and how the
peak called bandwidth will be changed as packets rate fig.5 shows the experimental graph result
of exponential traffic in which the packets of node0 will drop down at 1.43 as shown in fig.3 and
in graph of fig. 5 also as we known exponential distribution is on/off traffic distribution at one
time only traffic sends to destination.
Figure.5 Result analysis at Exponential node
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014
85
In the fig. 6 the experiment shows the result of ftp traffic on the network as every traffic has
different parameters as discussed in above algorithmic steps. Due to their parameters each will
drop down packet on different time period as in fig.6 packets will drop down Between 1.00 to 1.5
as shown by the bandwidth.
Figure.6 Result Analysis at FTP Traffic
As the same in Fig.7 results of bandwidth is shown for Preto type traffic.
Figure.7 Result analysis of preto traffic
Another type of traffic is CBR (constant Bit rate) traffic in which traffic sends at constant bit rate
through the help of its following parameters. The packets drop at 2.0 as shown by bandwidth in
graph of fig.7.
Table1. Traffic Parameters
Parameters Value
Traffic type Distributed Denial-of-service(DDoS)
Traffic generation at attacker TCP
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014
86
Traffic arrival at TCP CBR, FTP. expo, Preto
Packet_size 1000
Rate 100k
Ideal_time 1ms
Now time 0.1
In this experiment the simulator used for these above results is NS-2 that is a platform on which
source and attacker node sends the packet and due to attacker node packets drop down and
throughput comes in the form of Xgraph shows in above results of traffic shows how packets
sends and how many packets sends to d1 and how packets flow and drop down in a network. In
above results different types of traffic is generated at TCP nodes 0,1,2 and each traffic would
have following parameters to generate that traffics and due to their parameters each will drop out
there packets at different time period in the graphs.
4.CONCLUSION
The experimental analysis shows the flooding of packets by S1 will affect on the bandwidth of
network so the less packets will reach to destination and packet drop rate shows here in results
because of the different traffic generators at attacker node and other nodes.TCP is Connection
established protocol so less packets will drop at r1 as comparison to the UDP node and more no.
of packets will send at d1.
ACKNOWLEDGEMENTS
The authors would like to thank all the researchers and the authors of referred papers for their
contribution in this area.
REFERENCES
[1] Hamza Rahmani, Nabil Sahli, Farouk Kamoun, “DDoS flooding attack detection scheme based on F-
divergence”, Computer Communications 35 (2012) 1380–1391, Elsevier.
[2] Y. Xie, S. Tang, X. Huang, C. Tang, X. Liu, “Detecting latent attack behavior from aggregated Web
traffic”, Computer Communications 36 (2013) 895–907, Elsevier.
[3] Y. Xiang, Y. Lin, W.L. Lei ,S.J. Huang, “Detecting DDOS Attack on network Similarity”, IEE Proc.-
Commun., Vol. 151, No. 3, June 2004.
[4] Ming Li, Jun Li, Wei Zhao, “Experimental study of DDOS Attacking of Flood Type based on NS-2”,
International Journal of Electronics and Computers, 1(2) December 2009, pp. 143-152, International
Science Press, India.
[5] Monika Sachdeva, Gurvinder Singh, Krishan Kumar and Kuldip Singh, “Measuring Impact of DDOS
Attacks on Web services”, Journal of Information Assurance and Security 5 (2010) 392-400, Received
January 01, 2010 1554-1010 $ 03.50 Dynamic Publishers, Inc.
[6] Vooka Pavan Kumar1, Abhinava Sundaram.P, Munnaluri Bharath Kumar, N.Ch.S.N.Iyengar,
“ANALYSIS OF DDoS Attacks in distributed peer to peer networks”, Journal of Global Research in
Computer Science, Volume 2, No. 7, July 2011.
[7] Shiv Kumar, Ritika Singal, Priyadarshni, “ Mitigate the Impact of DoS Attacks by Verifying Packet
Structure”, International Journal of Advanced Research in Computer Science and Software
Engineering Volume 3, Issue 8, August 2013 ISSN: 2277 128X.
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014
87
[8] DollyUppal, Vishakha Mehraand Vinod Verma ”Basic survey on Malware Analysis, Tools and
Techniques”, International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1,
February 2014.
[9] Po-wah yau, Shenglan hu and Chris j. mitchell, “Malicious attacks on ad hoc network routing
protocols”, Information Security Group,Royal Holloway, University of LondonEgham, Surrey TW20
0EX, UK P.Yau, S.Hu, C.Mitchell@rhul.ac.uk
[10]Mozmin Ahmed, Dr. Md. Anwar Hussain, “Effect of Malicious Node Attacks under Practical Adhoc
Network”, IRACST – International Journal of Computer Networks and Wireless Communications
(IJCNWC), ISSN: 2250-3501 Vol.2, No5, October 2012.
[11]A.Rajaram, Dr. S. Palaniswami, “Malicious Node Detection System for Mobile Ad hoc
Networks”,(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1
(2) , 2010, 77-85.
[12]Bharat Rawal, Harold Ramcharan and Anthony Tsetse, Shaw University “Augmented Split –protocol;
An Ultimate DDoS Defender”, International Journal on Computational Sciences & Applications
(IJCSA) Vol.4, No.1, February 2014.
Authors
Dr. S. S. Tyagi is presently working as a Professor and Head of the Department of Computer Science and
Engineering in Manav Rachna International University, Faridabad, Haryana, India. He is having an
experience of 22 years including 4 years of industrial and 18 years of teaching experience. He has been
holding various academic and administrative positions during his career. He has been consultant to some
software development companies. He has been an examiner and evaluator for M.Tech thesis and PhD
thesis. He has been a reviewer for books and research papers for some renowned and reputed journals. He
is guiding 07 Ph.D. Scholars in the field of Network Security, Ad hoc networks, Cloud Computing,
Wireless Security etc. There are around 40 publications to his credit published in reputed International
Journals, National Journals and in the proceedings of International and National Conferences and
contributing to the research for the benefit of mankind and society at large. His knowledge covers all major
areas of Computer Science and Engineering. Currently his areas of research interest are Network Security,
Wireless Communication, Mobile Ad hoc Networks, and Cloud Computing. Dr. S. S. Tyagi, is a member of
various professional bodies like IEEE, CSI, QCI, ASQ etc.
Kuldeep Tomar is a Research Scholar in the Department of CSE, MRIU, Faridabad,
Haryana, India. He has done M.E/M.Tech in Computer Science and Engineering from
C.I.T.M., Faridabad, India. He has a total work experience of 12 years (including academics and industry)
in different organizations. He is currently working as Associate Professor in NGF College of
Engineering & Technology, Palwal, Haryana, Indaia. He has published more than 17
papers in reputed International Journals, National Journals and in the proceedings of International and
National Conferences etc. Has is also written a book. He also is a member of Computer Society of India,
Membership No: N1039627.

Weitere ähnliche Inhalte

Was ist angesagt?

A network behavior analysis method to detect this writes about a method to ...
A network behavior analysis method to detect   this writes about a method to ...A network behavior analysis method to detect   this writes about a method to ...
A network behavior analysis method to detect this writes about a method to ...
Thang Nguyen
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...
Mumbai Academisc
 

Was ist angesagt? (20)

internet applications
 internet applications internet applications
internet applications
 
Monitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a lanMonitoring of traffic over the victim under tcp syn flood in a lan
Monitoring of traffic over the victim under tcp syn flood in a lan
 
Chapter 2 - Application Layer
Chapter 2 - Application LayerChapter 2 - Application Layer
Chapter 2 - Application Layer
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)Lec 2(intoduction of computer networkes)
Lec 2(intoduction of computer networkes)
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
Lec 12(Transport Layer)
Lec 12(Transport Layer)Lec 12(Transport Layer)
Lec 12(Transport Layer)
 
Week4 lec1-bscs1
Week4 lec1-bscs1Week4 lec1-bscs1
Week4 lec1-bscs1
 
Area25 Learning DS1
Area25 Learning DS1Area25 Learning DS1
Area25 Learning DS1
 
Chapter 9 - Multimedia Networking
Chapter 9 - Multimedia NetworkingChapter 9 - Multimedia Networking
Chapter 9 - Multimedia Networking
 
A network behavior analysis method to detect this writes about a method to ...
A network behavior analysis method to detect   this writes about a method to ...A network behavior analysis method to detect   this writes about a method to ...
A network behavior analysis method to detect this writes about a method to ...
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
 
Chapter3 transport
Chapter3 transportChapter3 transport
Chapter3 transport
 
Chapter 3 - Transport Layer
Chapter 3 - Transport LayerChapter 3 - Transport Layer
Chapter 3 - Transport Layer
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
Ijnsa050211
Ijnsa050211Ijnsa050211
Ijnsa050211
 

Andere mochten auch

Paul Flood-Market-commentaryMay 18-2013
Paul Flood-Market-commentaryMay 18-2013Paul Flood-Market-commentaryMay 18-2013
Paul Flood-Market-commentaryMay 18-2013
PAUL FLOOD
 
Registro médico
Registro médicoRegistro médico
Registro médico
Lu Pérgon
 
Pyramids24 rotated
Pyramids24 rotatedPyramids24 rotated
Pyramids24 rotated
tim reeves
 
Pyramids25 rotated
Pyramids25 rotatedPyramids25 rotated
Pyramids25 rotated
tim reeves
 

Andere mochten auch (10)

Task scheduling methodologies for high speed computing systems
Task scheduling methodologies for high speed computing systemsTask scheduling methodologies for high speed computing systems
Task scheduling methodologies for high speed computing systems
 
Paul Flood-Market-commentaryMay 18-2013
Paul Flood-Market-commentaryMay 18-2013Paul Flood-Market-commentaryMay 18-2013
Paul Flood-Market-commentaryMay 18-2013
 
ŠKODA magazín leto 2015
ŠKODA magazín leto 2015ŠKODA magazín leto 2015
ŠKODA magazín leto 2015
 
Survey of uncertainty handling in cloud service discovery and composition
Survey of uncertainty handling in cloud service discovery and compositionSurvey of uncertainty handling in cloud service discovery and composition
Survey of uncertainty handling in cloud service discovery and composition
 
Project on SAARC
Project on SAARCProject on SAARC
Project on SAARC
 
Internet
InternetInternet
Internet
 
Registro médico
Registro médicoRegistro médico
Registro médico
 
Project on Marketing Strategy of Maruti Suzuki.
Project on Marketing Strategy of Maruti Suzuki.Project on Marketing Strategy of Maruti Suzuki.
Project on Marketing Strategy of Maruti Suzuki.
 
Pyramids24 rotated
Pyramids24 rotatedPyramids24 rotated
Pyramids24 rotated
 
Pyramids25 rotated
Pyramids25 rotatedPyramids25 rotated
Pyramids25 rotated
 

Ähnlich wie Quantifying the impact of flood attack on

What is a TCP Flood Attack.pdf
What is a TCP Flood Attack.pdfWhat is a TCP Flood Attack.pdf
What is a TCP Flood Attack.pdf
uzair
 

Ähnlich wie Quantifying the impact of flood attack on (20)

DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in CloudDFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
 
1766 1770
1766 17701766 1770
1766 1770
 
1766 1770
1766 17701766 1770
1766 1770
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
 
What is a TCP Flood Attack.pdf
What is a TCP Flood Attack.pdfWhat is a TCP Flood Attack.pdf
What is a TCP Flood Attack.pdf
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
C241721
C241721C241721
C241721
 
Denial of service attacks and mitigation
Denial of service attacks and mitigationDenial of service attacks and mitigation
Denial of service attacks and mitigation
 
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networksAdvisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
 
Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122Icimt 2010 procediing rp118 vol.2 d10122
Icimt 2010 procediing rp118 vol.2 d10122
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileAdvisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobile
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET
 
A Trusted Approach Towards DDos Attack
A Trusted Approach Towards DDos AttackA Trusted Approach Towards DDos Attack
A Trusted Approach Towards DDos Attack
 
Impact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing ProtocolImpact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing Protocol
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocol
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
L1803046876
L1803046876L1803046876
L1803046876
 

Kürzlich hochgeladen

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Kürzlich hochgeladen (20)

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 

Quantifying the impact of flood attack on

  • 1. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014 DOI:10.5121/ijcsa.2014.4607 79 Quantifying the Impact of Flood Attack on Transport Layer Protocol KULDEEP TOMAR 1 AND S.S TYAGI 2 1 Research Scholar, Department of CSE, MRIU, Faridabad, Haryana, India 2 Professor & Head, Department of CSE, MRIU, Faridabad, Haryana, India ABSTRACT As growth of internet and computer increase day by day so as the growth of attacks on network is also tremendously increased day by day. In this paper we introduced a wired network and create two TCP source node and one attacker node (Distributed denial-of-service) flooding type attack which is the attack on the bandwidth of TCP node at source side sends data to destination through router and also measure the impact of Denial-of-service attack (DoS) on that wired network how packets of other source nodes and that node will drop down due to the impact of flooding type denial-of-service attack and shows the result using NS-2 NAM & Xgraph windows in simulation. Keywords CBR, DoS, DDoS, NAM, TCP, Wired Network . 1.INTRODUCTION In Today’s world, network security is major concern in computer network. There are so many attackers who spoof the important information and misused that information through these kinds of attacks on network attackers spoof the information. Denial-of-service is not only the issue in the internet but rather it changes the mandatory or required information when there would be slight change in the protocols. The emergence of Distributed denial-of-service exists in the base of the Internet architecture [1] and there are so many methods through which we will detect the DDoS attack as in [2][3]. There are following types of attacks that come against the infrastructure of Internet. • Attack against TCP/IP • Attack against DNS • Attack against Border gateway protocol And there are some attacks that comes under the wired network • Denial of Service Attack • Modify the information • Escalation • Destruct the data • Disclosure
  • 2. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014 80 In this paper we introduce the DDoS attack (Distributed denial-of-service) called Flooding type Attack which is on the bandwidth of the network. Denial of service attack divided in following three categories: • Flooding type Attack • Protocol Attack • Logical Attack We consider the attack on bandwidth introduced on the wired network and measure or calculate the impact of flooding DDoS attack on the TCP protocol. We experimentally show the result of flooding attack by network simulator NS-2. In which change the bandwidth range and the result is shown as packets will drop down at the node 3 called router node r1. In Transport layer TCP and UDP are the two protocols on which impact measured. We consider the TCP protocol and measure the performance of TCP protocol by Xgraph and NAM output files. As we know the TCP is connection oriented protocol and every time before packet sends to destination the connection would established. 2.BACKGROUND AND RELATED WORK There are following comparative study and experiments implemented on TCP and UDP protocols, detecting denial-of-service flooding type attack on TCP & UDP. In this we analyse the quantitative description of flood type on the bandwidth & its results on packets drop other source nodes at router. In [4] we analyse the study on transport layer as now we study application layer protocol with the traffic CBR, Expo, ftp etc. as we recognize DDoS is single most important threats for the recent Internet as of its ability to generate a enormous volume of redundant or not needed(unwanted) traffic[5].however the number of techniques have been anticipated to conquer denial–of-service attacks in Distributed Peer-to-peer networks, it is still extremely inflexible to react to the flood based DDoS attacks due to a huge number of attacking technology and make use of this type of technology to spoof the source- address. A well-organized structure has been considered to detect and defend from the Distributed denial-of-service attacks in Peer-to-Peer networks. It prevent against these type of threats or attacks by allowing to maintain the distance among source and the dupe end [6].In the following category of threat, an attacker attempt to avoid the use or release of a valuable resource to their intentional viewers or clients. It may be implemented by the use of various methods, in reality and on computer device. For example, any attacker can disallow everyone to access telephone systems by cutting down the main telecom wire from a building, by repetitively calling each accessible phone line, or by distort their PBX [7]. Up to now we understand the work of malicious node[8] on wired network and on transport layer now we study the effect of malicious node that attacker node on wireless network also as in [9][10][11] attacker node affect the zone or on wireless network area. There is also a protocol which works as defender in DDoS [12]. 3.EXPERIMENTAL ANALYSIS In this paper our work is on the TCP protocol and we implement the result with 4 type of traffic (CBR, FTP, Preto and Exponential) as architecture shown in fig. 1 below:
  • 3. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014 81 Figure.1 Architecture of Wired Network with Attacker node In this architecture 2 nodes called as a user node (TCP node) S1, S3 in network and S2 is attacker node (TCP Node) which will affect the both source node s1, s3 called 0, 2 and s2 is attacker node 1 and r1 is router node called 3 and d1 is destination node called 4 in the fig.2 and results shows the performance of each traffic on the TCP by the bandwidth. Data sends from node0 is 0.2 MB so only 20% data is send from node0 to r1 and 55% data sends from node1 attacker node to r1 so that traffic will affect the node0, node2 so the packets from node0,node2 will be drop down due to attacker node traffic. Node2 sends 45% traffic to r1, and r1 sends 20% data to d1, as shown in results. In TCP/IP the TCP is transport layer protocol in which attaches the traffics to TCP node and algorithm is shown as: 1. Create a Simulator set st[new Simulator] 2. Select the colors $st color 0 red $st color 1 green $st color 2 blue 3. Set the shape $ no Shape”circle” $ no Color”black” Same for n1, n2, n3, n4 4. Set the three output files as f_name as f0,f1,f2 5. Create the five nodes as set n0 [$st node] set n1 [$s tnode] set n2 [$st node] set n3 [$st node] set n4 [$st node] 6. Create the duplex/simplex link between the nodes as source node n0 to router n3 and attach the delay and bandwidth in the queue(RED/DropTail) as set the data %
  • 4. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014 82 $st duplex-link $n0 $n3 0.2 Mb 100ms DropTail # set the Attacker node as means 55% data send from attacker node $st duplex-link $n1 $n3 0.55Mb 200ms DropTail $st duplex-link $n2 $n3 0.45Mb 300ms DropTail $st duplex-link $n3 $n4 0.8Mb 100ms DropTail #For creating TCP Agent steps are 7. set tcp1 [new Agent/TCP] 8. $st attach-agent $node $tcp1 9. $tcp1 set class_ 2 10. set sink1[newAgent/TCPSink] 11. $st attach-agent $n4 $sink 12. #Connect the traffic ( CBR/ Expo/ Preto/ftp) source with the traffic sink 13. $st connect $tcp $sink1 14. $tcp1 set fid_ 1 15. #Following steps are the parameters of CBR #Setup a CBR over TCP connection for node n0, n1, n2 Set cbr1as [new Application/Traffic/CBR] $cbr1 attach-agent $tcp1 15.1 #Parameters of CBR $cbr1 firstly set type of traffic as set type then $cbr1 set packet_size $cbr1 set rate $cbr1 set random #And for exponential traffic parameters steps are: #Setup a Exponential over TCP connection for node n0 set exp0 [ new Application / Traffic/ Exponential ] 15.2 #parameters of expo traffic are $exp0 attach-agent $exp0 set packet_size $exp0 set burst_time $exp0 set idle_time $exp0 set rate #And for FTP traffic parameters steps are:
  • 5. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014 83 #Setup a FTP over TCP connection for node n0 set ftp [new Application/FTP] 15.3 #parameters of ftp are $ftp attach-agent $tcp1 $ftp set type_ FTP 16. Then record the procedure for bandwidth. Figure.2 Architecture of 5 nodes Fig. 2 represents the 5 nodes wired scenario in which packets send from s0 i.e. 0 to r1 (router) i.e. 3 and through the router to d1 i.e. 4 at that time packets send by only S0 and no data sends from S1 i.e. the attacker node so no data will drop at r1. As and in fig. 3 represents the packets will drop down due to S1 sends packet to r1 so the packets of S0 and S3 are drop down. Figure.3 Packets Drop of node0 and node2 due to node1
  • 6. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014 84 Even also the Effect of this attacker node, S1 will also drop the packets at some time in the Network as shown in Fig. 4. Figure.4 Packets of node1 also drop down at r1 Now the results analysis is shown by the graph at which time packets will drop down and how the peak called bandwidth will be changed as packets rate fig.5 shows the experimental graph result of exponential traffic in which the packets of node0 will drop down at 1.43 as shown in fig.3 and in graph of fig. 5 also as we known exponential distribution is on/off traffic distribution at one time only traffic sends to destination. Figure.5 Result analysis at Exponential node
  • 7. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014 85 In the fig. 6 the experiment shows the result of ftp traffic on the network as every traffic has different parameters as discussed in above algorithmic steps. Due to their parameters each will drop down packet on different time period as in fig.6 packets will drop down Between 1.00 to 1.5 as shown by the bandwidth. Figure.6 Result Analysis at FTP Traffic As the same in Fig.7 results of bandwidth is shown for Preto type traffic. Figure.7 Result analysis of preto traffic Another type of traffic is CBR (constant Bit rate) traffic in which traffic sends at constant bit rate through the help of its following parameters. The packets drop at 2.0 as shown by bandwidth in graph of fig.7. Table1. Traffic Parameters Parameters Value Traffic type Distributed Denial-of-service(DDoS) Traffic generation at attacker TCP
  • 8. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014 86 Traffic arrival at TCP CBR, FTP. expo, Preto Packet_size 1000 Rate 100k Ideal_time 1ms Now time 0.1 In this experiment the simulator used for these above results is NS-2 that is a platform on which source and attacker node sends the packet and due to attacker node packets drop down and throughput comes in the form of Xgraph shows in above results of traffic shows how packets sends and how many packets sends to d1 and how packets flow and drop down in a network. In above results different types of traffic is generated at TCP nodes 0,1,2 and each traffic would have following parameters to generate that traffics and due to their parameters each will drop out there packets at different time period in the graphs. 4.CONCLUSION The experimental analysis shows the flooding of packets by S1 will affect on the bandwidth of network so the less packets will reach to destination and packet drop rate shows here in results because of the different traffic generators at attacker node and other nodes.TCP is Connection established protocol so less packets will drop at r1 as comparison to the UDP node and more no. of packets will send at d1. ACKNOWLEDGEMENTS The authors would like to thank all the researchers and the authors of referred papers for their contribution in this area. REFERENCES [1] Hamza Rahmani, Nabil Sahli, Farouk Kamoun, “DDoS flooding attack detection scheme based on F- divergence”, Computer Communications 35 (2012) 1380–1391, Elsevier. [2] Y. Xie, S. Tang, X. Huang, C. Tang, X. Liu, “Detecting latent attack behavior from aggregated Web traffic”, Computer Communications 36 (2013) 895–907, Elsevier. [3] Y. Xiang, Y. Lin, W.L. Lei ,S.J. Huang, “Detecting DDOS Attack on network Similarity”, IEE Proc.- Commun., Vol. 151, No. 3, June 2004. [4] Ming Li, Jun Li, Wei Zhao, “Experimental study of DDOS Attacking of Flood Type based on NS-2”, International Journal of Electronics and Computers, 1(2) December 2009, pp. 143-152, International Science Press, India. [5] Monika Sachdeva, Gurvinder Singh, Krishan Kumar and Kuldip Singh, “Measuring Impact of DDOS Attacks on Web services”, Journal of Information Assurance and Security 5 (2010) 392-400, Received January 01, 2010 1554-1010 $ 03.50 Dynamic Publishers, Inc. [6] Vooka Pavan Kumar1, Abhinava Sundaram.P, Munnaluri Bharath Kumar, N.Ch.S.N.Iyengar, “ANALYSIS OF DDoS Attacks in distributed peer to peer networks”, Journal of Global Research in Computer Science, Volume 2, No. 7, July 2011. [7] Shiv Kumar, Ritika Singal, Priyadarshni, “ Mitigate the Impact of DoS Attacks by Verifying Packet Structure”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 8, August 2013 ISSN: 2277 128X.
  • 9. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6,December 2014 87 [8] DollyUppal, Vishakha Mehraand Vinod Verma ”Basic survey on Malware Analysis, Tools and Techniques”, International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014. [9] Po-wah yau, Shenglan hu and Chris j. mitchell, “Malicious attacks on ad hoc network routing protocols”, Information Security Group,Royal Holloway, University of LondonEgham, Surrey TW20 0EX, UK P.Yau, S.Hu, C.Mitchell@rhul.ac.uk [10]Mozmin Ahmed, Dr. Md. Anwar Hussain, “Effect of Malicious Node Attacks under Practical Adhoc Network”, IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501 Vol.2, No5, October 2012. [11]A.Rajaram, Dr. S. Palaniswami, “Malicious Node Detection System for Mobile Ad hoc Networks”,(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 (2) , 2010, 77-85. [12]Bharat Rawal, Harold Ramcharan and Anthony Tsetse, Shaw University “Augmented Split –protocol; An Ultimate DDoS Defender”, International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014. Authors Dr. S. S. Tyagi is presently working as a Professor and Head of the Department of Computer Science and Engineering in Manav Rachna International University, Faridabad, Haryana, India. He is having an experience of 22 years including 4 years of industrial and 18 years of teaching experience. He has been holding various academic and administrative positions during his career. He has been consultant to some software development companies. He has been an examiner and evaluator for M.Tech thesis and PhD thesis. He has been a reviewer for books and research papers for some renowned and reputed journals. He is guiding 07 Ph.D. Scholars in the field of Network Security, Ad hoc networks, Cloud Computing, Wireless Security etc. There are around 40 publications to his credit published in reputed International Journals, National Journals and in the proceedings of International and National Conferences and contributing to the research for the benefit of mankind and society at large. His knowledge covers all major areas of Computer Science and Engineering. Currently his areas of research interest are Network Security, Wireless Communication, Mobile Ad hoc Networks, and Cloud Computing. Dr. S. S. Tyagi, is a member of various professional bodies like IEEE, CSI, QCI, ASQ etc. Kuldeep Tomar is a Research Scholar in the Department of CSE, MRIU, Faridabad, Haryana, India. He has done M.E/M.Tech in Computer Science and Engineering from C.I.T.M., Faridabad, India. He has a total work experience of 12 years (including academics and industry) in different organizations. He is currently working as Associate Professor in NGF College of Engineering & Technology, Palwal, Haryana, Indaia. He has published more than 17 papers in reputed International Journals, National Journals and in the proceedings of International and National Conferences etc. Has is also written a book. He also is a member of Computer Society of India, Membership No: N1039627.