Mitigating the Distributed Denial of Service (DDoS) Attacks in Campus Local Area Network(CLAN)
DOI:
https://doi.org/10.24297/ijct.v10i6.7010Keywords:
DDoS, CLAN, Firewall, VLAN, Syn Flood, UTMAbstract
The Campus Local Area Network (CLAN) of academic institutions interconnect computers ranging from one hundred to about twenty five hundred and these computers are located in academic building(s), hostel building(s), faculty quarter(s), students amenities centre, etc all around the campus. The students, faculty and the supporting staff members use the network primarily for internet usage at both personal and professional levels and secondarily for usage of the available services and resources. Various web based services viz: Web Services, Mail Services, DNS, and FTP services are generally made available in the campus LAN. Apart from these services various intranet based services are also made available for the users of the LAN.
Campus LAN users from the hostels change very frequently and also sometime become targets (we call as soft targets) to the attackers or zombie because of either inadequate knowledge to protect their own computer/ laptop, which is also a legitimate node of the campus LAN; or their enthusiastic nature of experimentation. The interconnectivity of these legitimates nodes of the campus LAN and that of the attackers in the World Wide Web, make the computers connected in the LAN (nodes) an easy target for malicious users who attempt to exhaust the resources by launching Distributed Denial-of-Service (DDoS) attacks. In this paper we present a technique to mitigate the distributed denial of service attacks in campus wide LAN by limiting the bandwidth of the affected computers (soft targets) of the virtual LAN from a unified threat management (UTM) firewall. The technique is supported with help of bandwidth utilization report of the campus LAN with and without implementation of bandwidth limiting rule; obtained from the UTM network traffic analyzer. The graphical analyzer report on the utilization of the bandwidth with transmitting and receiving bits of the campus LAN after implementation of our bandwidth limiting rule is also given.
Downloads
References
[2] Christensen, K. J., "Local Area Networks-evolving from shared to switched access" IBM Systems Journal v34 n3 (`95) p347-74 .
[3] Zhu, M. and Molle, M., ¡°Design and Implementation of Application-based Secure VLAN¡±, Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN.04), November 2004.
[4] "RFC 4987 . TCP SYN Flooding Attacks and Common Mitigations". Tools.ietf.org. visited 26th July 2013.
[5] https://en.wikipedia.org/wiki/SYN_flood visited 26th July 2013 .
[6] The Internet Protocol Journal - Volume 7, Number 4 Distributed Denial of Service Attacks Patrikakis, C. Masikos, M. and Zouraraki , O. National Technical University of Athens.
[7] Kevin Tsui, "Tutorial-Virus (Malicious Agents)," University of Calgary, October 2001.
[8] Nicholas Weaver, "Warhol Worms: The Potential for Very Fast Internet Plagues," http://www.iwar.org.uk/comsec/resources/worms/warhol-worm.htm
[9] Nicholas Weaver, U.C. Berkeley BRASS group, "Potential Strategies for High Speed Active Worms: A Worst Case Analysis," February 2002.
[10] Moore,D. and Shannon,C. "The Spread of the Code Red Worm (crv2)," July 2001, http://www.caida.org/analysis/security/codered/coderedv2_analysis.xml#animations
[11] Deng, G. and Huang, S. ¡°Case Study on Incentive Mechanism and Its Effectiveness Of Campus Network in Virtual Community----Case of Myclub2.com¡±, 978-1-4244-6359-6/10/$26.00 ¨Ã2010 IEEE
[12] Ramamoorthi, A., Subbulakshmi, T. and Mercy Shalinie, S.; ¡°Real Time Detection and Classification of DDoS Attacks using Enhanced SVM with String Kernels¡±, IEEE-International Conference on Recent Trends in Information
Technology, ICRTIT 2011, 978-1-4577-0590-8/11/$26.00 ¨Ã2011 IEEE, MIT, Anna University, Chennai. June 3-5, 2011
[13] Zhijun WU; WANG, C. and ZENG, H.; ¡°Research on the Comparison of Flood DDoS and Low-rate DDoS¡±, 978-1- 61284-774-0/11/$26.00 ¨Ã2011 IEEE.
[14] Renuka Devi, S. and Yogesh, P., ¡°An Effective Approach to Counter Application Layer DDoS Attacks¡±, ICCCNT'12, IEEE-20180, 26th_28th July 2012, Coimbatore, India