Defence Mechanism of Distributed Reflective Denial of Service (DRDOS) Attack by using Hybrid (CPU-GPU) Computing System

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-27 Number-1
Year of Publication : 2015
Authors : Gagandeep, Er. Meenakshi
  10.14445/22312803/IJCTT-V27P106

MLA

Gagandeep, Er. Meenakshi "Defence Mechanism of Distributed Reflective Denial of Service (DRDOS) Attack by using Hybrid (CPU-GPU) Computing System". International Journal of Computer Trends and Technology (IJCTT) V27(1):31-39, September 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Distributed Reflection Denial of Service (DRDOS) attack has become the daunting problem for businesses, system administrators, and computer system users. Distributed Reflective Denial of Service (DRDOS) attack typically exhausts bandwidth, processing capacity, or memory of a targeted machine, service or network. DRDOS attack reflects the traffic through reflector that becomes difficult to trace back the real attacker. Prevention and detection of a DRDOS attack is an important research topic for researchers throughout the world. Despite enormous efforts in combating DRDOS attacks in the past decade, DRDOS attacks are still a serious threat to the security of cyberspace. So a defence mechanism is used to combat the Distributed Reflected Denial of Service Attack by using additional hardware called Graphical Processing Unit (GPU) with victim’s machine called hybrid computing system. The results show that the hybrid (CPU-GPU) computing machine can handle the amplified response (i.e. 33 times more than the request packet) more efficiently than the normalmachine (with only CPU).

References
[1] Kurbalijia, "How the Internet Works," 14 June 2014. [Online]. Available: https://edri.org/files/2012EDRiPapers/how_the_internet_works.pdf. [Accessed 04 September 2014].
[2] B. A. Forouzan, Data Communications and Networking, New York: Alan R. Apt., 2007.
[3] Wessling, "European Digital Organization," How internet works, pp. 23-25.
[4] Srikanth, "Difference between Public IP and Private IP address," 04 2009 Jul. [Online]. Available: http://www.gohacking.com/private-and-public-ipaddresses/. [Accessed 14 Feb 2015].
[5] N. K. a. S. Monga, "COMPARISONS OF WIRED AND WIRELESS NETWORKS," Technical Journal, vol. V, no. II, pp. 34-35, 2014.
[6] Manider, "Local Area Network and Wide Area Network," 10 March 2015. [Online]. Available: www.ftthernakulam.co.in/LDCE/.../IT/AIGETOA/06b.LAN-WAN.pd.
[7] NetGear, "Wireless Network Basics," Netgear, Santa Clara, 2005.
[8] A. a. D. S. Tyagi, "Study of MANET: Characteristics, Challenges, Application and Security Attacks," International Journal of Advanced Research in Computer Science and Software Engineering, pp. 252-258, 2013.
[9] H. a. Mathew, "Active Attacks," 15 March 2015. [Online]. Available: http://whatis.techtarget.com/definition/active-attack.
[10] C. Janssen, "Masquerade Attack," 25 March 2015. [Online]. Available: http://www.techopedia.com/definition/4020/masquerade-attack.
[11] Ziff Davis, "Replay Attack," 05 April 2015. [Online]. Available: http://www.pcmag.com/encyclopedia/term/50439/replay-attack.
[12] A. M. Christos Douligeris, "DDoS attacks and defense mechanisms," in Science Direct, Greece, 2003.
[13] A. J. H. D. S. P. S. S. Y. M. Nikhil.P.Kulkarni, "DNS AND NTP Based Amplification Attacks," Cyber Security and Privacy Foundation, 2014.
[14] X. L. W. C. a. C. Z. Kai Ma, "GreenGPU: A Holistic Approach to Energy Efficiency in GPU-CPU Heterogeneous Architectures," in Parallel Processing (ICPP), 2012 41st International Conference, Pittsburgh, 2012.
[15] F. V. E. G. a. J. F. J.I. Agulleiroa, "Hybrid computing: CPU+GPU coprocessing and its application to tomographic reconstruction," Ultramicroscopy, pp. 109-114, 2012.
[16] W. W. a. D. P. Chenhan D. Yua, "A CPU–GPU hybrid approach for the unsymmetric multifrontal method," in 6th International Workshop on Parallel Matrix Algorithms and Applications, 2011.
[17] B. A. Forouzan, Data Communications and Networking, New York: Alan R. Apt, 2007.
[18] N. K. a. S. Monga, "COMPARISONS OF WIRED AND WIRELESS NETWORKS:," Technical Journal, pp. 34-35, 2014.
[19] M. Haughn, "Passive Attack," 14 March 2015. [Online]. Available: http://whatis.techtarget.com/definition/passive-attack.

Keywords
DOS, DDOS, DRDOS, NTP, SMNP