EShield: An Effective Detection and Mitigation of Flooding in DDoS Attacks over Large Scale Networks
J. Daniel Francis Selvaraj1, I. Diana Jeba Jingle2, P. Mano Paul,3

1J. Daniel Francis Selvaraj, Department of Information Technology, Sri Krishna College of Engineering and Technology, Coimbatore (Tamil Nadu), India.
2I. Diana Jeba Jingle, Department of CSE, Christ University, Bengaluru (Karnataka), India.
3P. Mano Paul, Department of CSE, Presidency University, Bengalurur (Karnataka), India.

Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 1557-1562 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7304068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Distributed Denial-of-Service attacks are very hard to be mitigated in wireless network environment. Here in this manuscript, an effective method of flood detection and mitigation architecture is proposed named eShield, which detects and prevent flooding attacks through spoof detection technique. The proposed method uses an architecture and an algorithm. eShield deals with Intrusion Protection and Detection Systems (IPDS) which collaboratively defend flooding attacks at different points in the network. Here eShield detects the supply node with its port variety which were below assault. Inorder to reduce the burden on international IPDS eShield makes use of distinct nearby IPDS for the assaults in flooding which have been carried out collaboratively. The assessment is done through the widespread simulation of eShield and it is proved to be an actual values based on time delay, false positive rates, computation and communication overhead.
Keywords: Flooding, Router, Gateway, Bandwidth

Scope of the Article: Large-Scale Cyber Systems