Providing Network Security Against Botnets and SYN Flooding Attack

Nithin Gopal Krishna T P, Global Academy Of Technology; Kiran G ,Global Academy Of Technology; Nagendra Prasad P ,Global Academy Of Technology; Anvesh P A ,Global Academy Of Technology; Shruthi P ,Global Academy Of Technology

Network Security, Botnets, SYN flooding, TCP connections, DoS attack, Network Traffic.

Network security is a big topic and is growing into a high profile in the field of Information Technology, due to its vast growth they are prone to various security concerns. In order to control these security concerns and prevent them this system is proposed. The security breaches of network include Denial of Service attacks. Botnets and SYN flooding attack are two Denial of Service attacks. SYN flood occurs when attackers make half-open connections by not responding to the SYN+ACK packet from server. When the server’s SYN buffer is full with these half-open TCP connections, it stops accepting SYN packets, thus resulting in denial of service to legitimate clients. Bots are the malicious scripts that perform automated tasks at a much higher rate than would be possible for a human alone. The SYN flooding and Botnets are detected and addressed before they become an issue and bring down the network service. SYN flooding attack is detected by considering the rate at which the SYN packets are sent, the server will then reject all these suspicious TCP connections, with TCP-RST packets to prevent the potential DOS attack. Later all the connections in the SYN-RECV state will be closed forcibly by the server with the RST packets. Bots usually perform actions faster than humans hence the best way to detect them is by analyzing its behavior. Hence the action time and action frequency considering the number of clicks and the rate at which the form is submitted are determined. The activities which generate abnormal network traffic are detected and the attacker IP is obtained, then the log of these attackers IP are stored in the database so that no further bot activities takes place from the infected client machine.
    [1] 2012 IEEE International Conference on Control System, Computing and Engineering, 23-25 Nov. 2012, Penang, Malaysia, “Bots and Botnets: An Overview of Characteristics,Detection and Challenges”, Meisam Eslahi, Rosli Salleh, Nor Badrul Anuar, 978-1-4673-31432/12/$31.00 ©2012 IEEE. [2] “Analysis of the SYN Flood DoS Attack“, 2013, 8, 1-11 Published Online June 2013 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2013.08.01 Copyright © 2013 MECS I.J. Computer Network and Information Security, 2013, 8, 1-11, Mitko Bogdanoski , Tomislav Shuminoski and Aleksandar Risteski. [3] Usha L, Chidananda Murthy P, “Securing Data Against Botnets and IP Spoofing”, in International Journal of Engineering Research & technology, ISSN : 2278-0181, pp 81-84 July 2014. [4] “Detection of SYN Flooding Attacks Using Linear Prediction Analysis” Dinil Mon Divakaran, Hema A. Murthy and Timothy A. Gonsalves Department of Computer Science and Engineering Indian Institute of Technology, Madras, 0-7803-9746-0/06/$20.00(2006) IEEE.
Paper ID: GRDJEV02I070048
Published in: Volume : 2, Issue : 7
Publication Date: 2017-07-01
Page(s): 25 - 29