Study of web service estimation using only ethernet frame header or IP packet header

Author(s):  
Daichi Sugita ◽  
Yoshihiro Ito
Keyword(s):  

The Packet classification method plays a significant role in most of the Network systems. These systems categories the incoming packets in various flows and takes suitable action based on the requirements. If the size of the network is vast and complexity will arise to perform the different operations, which affects the network performance and other constraints also. So there is the demand for high-speed packet classifiers to reduce the network complexity and improve the network performance. In this article, The Bit vector Packet classifier (BV-PC) Module is designed to improve the network system performance and overcome the existing limitation of Packet classification approaches on FPGA. The BV-PC Module contains Packet generation Unit (PGU) to receive the valid incoming packets, Memory Unit (MU) to store valid packets, Header Extractor Unit (HEU) extracts the IP Header address information from the Valid packets, The BV-Based Source and Destination Address (BV-SA, BV-DA) unit receives the IP packet header Information and Process with BV based rule set and aggregates the BV-SA and BV-DA outputs, Priority Encoder encodes the Highest priority BV Rule for the generation of Classified output. The BV-PC utilizes <2% Chip area (slices), works at 509.38MHz, and consumed Less 0.103 W of total Power on Artix-7 FPGA. The BV-PC operates with a latency of 5 clock cycles and works at 815.03Mpps throughput. The BV-PC is compared with existing approaches and provides Better improvements in Hardware constraints.


2013 ◽  
Vol 347-350 ◽  
pp. 3721-3723
Author(s):  
Jie Ying Lao ◽  
Zhi Lei Sun

Speedy IP Traceback method (SIPT) is deficient in monitoring and position attack sources, this paper puts forward an improvement scheme based on SIPT, it only marks two-three times for the packet on the key locations, and the propose also overload rarely used fields on IP packet header to store the checkpoint information, which can traceback the attack source use these marking information, which would help to attack path-reconstruction with a low false-positive rate as a guid.


2019 ◽  
Vol 3 (1) ◽  
pp. 76-84
Author(s):  
Gede Barkah Widagdo

This paper is the initials of DDoS mitigation, the goal of this research is to detect NTP Amplification as early as possible so that the victim have a data to do further eskalation process. We knows that the goal of the attacker using NTP Amplification Attack is to exhaust the bandwidth of the victim, in this research also simulate an NTP amplification scenario and detection method; the scenario is the attacker sends requests with spoofed IP MONLIST victim to the compromised NTP server NTP server then responds the large volumes of traffic (amplified traffic) towards Victim to consume the bandwidth so as the legitimate user could not access the services. We put DDoS detection device side of the victim, we combine several monitoring tools to detect NTP amplification i.e bandwidth gauge and netflow analyzer. Netflow analyzer (flow analysis) conduct analysis IP packet header that is sent by the router as a flow-exporter. In our experiment, we could perform early detection of the NTP amplification less than 2 minute.


DDoS attacks are instigated by intruders on primary servers which provide important services like file service, web service etc., by sending huge amount of unwanted traffic. Routers in traditional systems simply forward such traffic to the victim servers without understanding its implications. However, such attacks can be identified and mitigated by controller in Software Defined Networks (SDN). In this paper we show how DDoS attack on primary servers in an SDN environment, can be mitigated by controller with the help of packet header translation. The traffic sent to the target server will be first intercepted by the controller to check whether it is attack traffic or genuine traffic, after which only the genuine traffic is forwarded to the server while the attack traffic is dropped.


2005 ◽  
Vol 8 (1) ◽  
pp. 16-18
Author(s):  
Howard F. Wilson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document