Protection of Critical System from Botnet Based Ddos Attack using Self-Triggered Filters
Dhivyapriya K1, L. Kavisankar2, Udaya Mouni Boppana3, D. Nagarajan4

1Dhivyapriya K, Department of Computer Science and Engineering, Hindustan Institute of Technology and Science, Chennai (Tamil Nadu), India.
2L. Kavisankar, Department of Computer Science and Engineering, Hindustan Institute of Technology and Science, Chennai (Tamil Nadu), India.
3Udaya Mouni Boppana, Department of Computer Science and Engineering, Hindustan Institute of Technology and Science, Chennai (Tamil Nadu), India.
4D. Nagarajan, Department of Mathematics, Hindustan Institute of Technology and Science, Chennai (Tamil Nadu), India.

Manuscript received on 01 May 2019 | Revised Manuscript received on 15 May 2019 | Manuscript published on 30 May 2019 | PP: 2576-2580 | Volume-8 Issue-7, May 2019 | Retrieval Number: G5848058719/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The motivation of our project is to defend DDOS attack without degradation of network resources and bandwidth. In order to defend DDOS attack, black hole filters are placed in the network, where the inbound or outbound traffic is dropped silently. The black hole filters are invisible, while studying the network topology and can be found only by monitoring the lost packets. There is a technique called remote triggered black filter, that has the ability to discard unexceptionable traffic before it gets entered into the protected area network. But the drawback is, it is located within the premises of victim. So, sometimes the trigger itself gets nonresponsive because of too many packet flooding caused due to DDOS attack. Even if the remote triggers relocate its places in order to avoidthe effects caused due to DDOS attack, still the remote triggers are vulnerable as we cannot predict the direction flow of attack packets. So, before degradation of internal network bandwidth, it is necessary to defend the DDOS attack. The triggers that are placed in the network in order to defend DDOS attack, should withstand the effects and impacts caused by DDOS attack. In order to defend DDOS attack, a self-triggered black hole filter should be placed within the control of internet service provider as they have the power to block anything and everything. The self-triggered filters in the network are placed after the proxy server. If there is an anonymity in network behavior like packet flooding, the triggers placed after the proxy server will get self-triggered.
Keyword: DDOS Attack, Black Hole Filter, Defending DDOS Attack, Self-Triggered Black Hole Filter, ISP.
Scope of the Article: Aspect-Based Software Engineering