CFP last date
16 December 2024
Reseach Article

Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS

by Ashish Kumar, Ajay K Sharma, Arun Singh
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 6
Year of Publication: 2012
Authors: Ashish Kumar, Ajay K Sharma, Arun Singh
10.5120/ijais12-450106

Ashish Kumar, Ajay K Sharma, Arun Singh . Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS. International Journal of Applied Information Systems. 4, 6 ( December 2012), 1-6. DOI=10.5120/ijais12-450106

@article{ 10.5120/ijais12-450106,
author = { Ashish Kumar, Ajay K Sharma, Arun Singh },
title = { Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS },
journal = { International Journal of Applied Information Systems },
issue_date = { December 2012 },
volume = { 4 },
number = { 6 },
month = { December },
year = { 2012 },
issn = { 2249-0868 },
pages = { 1-6 },
numpages = {9},
url = { https://www.ijais.org/archives/volume4/number6/359-0106/ },
doi = { 10.5120/ijais12-450106 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:47:27.889971+05:30
%A Ashish Kumar
%A Ajay K Sharma
%A Arun Singh
%T Performance Evaluation of DVMRP Multicasting Network over ICMP Ping Flood for DDoS
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 4
%N 6
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Paper evaluates the performance of Distance Vector Multicast Routing Protocol (DVMRP) Multicasting Network with two sources and four receivers, attack by five attackers. Attackers attacked the source 1 in network by ICMP Ping Flood. Here we execute the simulation and draw network throughput between source 1 and source 2, queuing transmission delay and drop out data packets at source 1 for ping packet of size 16, 64 and 96 Bytes for 500, 1500 and 2500 ping packets per second. The simulation results indicate that throughput decreases with the increase in attack packet size and intensity, delay increases with increase in attack packet size and decrease with increase in attacking intensity. Also, with the increase in attack packet size the number of dropped packets remain nearly same for different intensities.

References
  1. Monika Sachdeva, Krishan Kumar, Gurvinder Singh, Kuldip Singh, "Performance Analysis of Web Service under DDoS Attacks", 2009 IEEE International Advance Computing Conference (IACC 2009) Patiala, India, 6-7 March 2009.
  2. J. Mirkovic, D-WARD: Source-End Defense Against Distributed Denial-of-service Attacks, Ph. D. Thesis, University of California, Los Angeles, 2003.
  3. J. Mirkovic and P. Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communications Review, Volume 34, Issue 2, pp. 39-53, April, 2004.
  4. R. K. C. Chang, "Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial," IEEE Communication Magazine, pp. 42-51, 2002.
  5. Ping Flooding, can be found at: http://tomicki. net/ping. flooding. php
  6. Ping Flood (ICMP Echo) Detection, Can be found at: http://www. daxnetworks. com/Technology/TechDost/TD-101304-Ping%20Flood(ICMP%20Echo)%20Detection. pdf
  7. The ns Manual (formerly ns Notes and Documentation), The VINT Project A Collaboration between researchers at UC Berkeley, LBL, USC/ISI, and Xerox PARC. Kevin Fall hkfall@ee. lbl. govi, Editor Kannan Varadhan hkannan@catarina. usc. edui, Editor, May 9, 2010, page no 73.
  8. Multicasting White paper ,Allied Telesis,Can be found at http://www. alliedtelesis. com/media/pdf/multicasting_wp. pdf
  9. Arash Dana and Ahmad Malekloo,"Performance Comparison between Active and Passive Queue Management" ,IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No5, May 2010
  10. Distributed Denial of Service (DDoS),can be found at http://www. cert. org/homeusers/ddos. html
  11. Shigang Chen, Member,IEEE, and Qingguo Song, (2005), Perimeter– based Defense against Bandwith DDoS Attacks, IEEE Transactions on parallel and Distributed systems, Vol. 16,No. 6, Digital Object Identifier: 10. 1109/TPDS. 2005. 74.
  12. S. Gavaskar, R. Surendiran, Dr. E. Ramaraj, "Three Counter Defense Mechanism for TCP SYN Flooding Attacks", International Journal of Computer Applications (0975 – 8887) Volume 6– No. 6, September 2010.
  13. Christos Douligeris, Aikaterini Mitrokotsa, "DDoS attacks and defense mechanisms: classification and state-of-the-art", Elsevier, Computer Networks 44 (2004) 643–666.
Index Terms

Computer Science
Information Sciences

Keywords

DVMRP Drop Tail DDoS PING Flood Data Multicasting NS2