학술논문

Implementation of an Effective Methodology to Avoid DDoS Attacks using Cybersecurity Norms
Document Type
Conference
Source
2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE) Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE), 2024 International Conference on. :1-6 Jan, 2024
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Fields, Waves and Electromagnetics
Robotics and Control Systems
Signal Processing and Analysis
Surveys
Web and internet services
Internet security
Bandwidth
Denial-of-service attack
Routing
Routing protocols
Attacks
Cybersecurity
DoS
DDoS Attack
Novel Attack Detection Protocol
NADP
Dynamic Source Routing
DSR
Security
Communication
Language
Abstract
Today’s world wouldn't function without the Internet. Because the internet is a universal resource for information gathering, its accessibility is crucial. This research focuses on the Distributed Denial of Service (DDoS) attack because of the severe impact it has on network availability. DDoS attacks work by flooding the target with a large amount of unauthorized data, thereby occupying its available bandwidth as well as preventing genuine traffic from passing throughout. Modern cyber attacks are highly complex and difficult to detect in a decentralized network. In a distributed context, Denial of Service (DoS) and Distributed Denial of Service (DDoS) assaults induce resource unavailability. This has spurred the scientific community to develop viable ways in dispersed situations as a means of minimizing such attacks. This research focuses on the Distributed Denial of Service assault due to its devastating effects on network accessibility as a result of its flood of illegal data that usurps the victim’s bandwidth and stifles the flow of lawful traffic. This paper introduces a new method for detecting DDoS attacks, the Novel Attack Detection Protocol (NADP), and validates its effectiveness by comparing it to a more traditional routing protocol, Dynamic Source Routing (DSR). We have also detailed the various methods used in distributed denial of service attacks on Internet service providers. The goal of this project is to identify potential solutions to this problem, including methods for preventing and mitigating these attacks.