Sie sind auf Seite 1von 2

International Journal of Computer Science Research & Technology (IJCSRT)

ISSN: 2321-8827
Vol. 1 Issue 5, October - 2013

Different Types Of Port-Hopping Methods Used To Prevent Ddos Attacks

Treesa Nice P. A.1, Amitha Mathew2


Dept. of Computer Science and Engineering
Rajagiri School of Engineering and Technology

Abstract—This paper contains different types of port-hopping paper, different types of port-hopping methods are being
methods used for preventing Distributed Denial of Service discussed.
(DDoS) Attacks. Port-hopping is an efficient way to mitigate The paper is organized as follows. In Section II, the
the DDoS attacks. There are bandwidth based attacks, pseudo random number generation port-hopping is being
application level attacks, protocol based attacks etc. Port- described. Then in Section III, the acknowledgement based
hopping can be used to effectively mitigate application level port hopping method is being discussed. And in section IV,
DDoS attacks. true random number generation port hopping is also
discussed. Section V concludes the discussion.
Keywords-dos, ddos, attacks, mitigation, port-hopping.
II. PSEUDO RANDOM NUMBER GENERATION PORT
I. INTRODUCTION HOPPING
Now a day, the attackers are increasing to a greater Pseudo Random Number Generation methods are
extent. They will find out new ways or methods for algorithms that use some mathematical formulae or
attacking. If a new attack is found out, then some mitigation equations to create number sequences that appear randomly.
methods also being found out by experts. These methods will Now the algorithms for generating pseudo-random numbers
provide security to some extent. But this will not be a are generating the numbers which look exactly similar as
T
complete solution. At that time a new type of attack may be they were really random. Here, the port number of the server
SR
launched. Then it will be very difficult to get dealt with this. will be changed dynamically as a function of time [3]. The
Denial of Service attack is one type of attack. This will time will be divided into discrete time slots Ti, where i = {0,
prevent the legitimate or legal user from getting a service 1, 2....}, each of a given duration t. Then in different time
from the server. DoS attack is a dangerous type of attack. If slots, different port numbers are being used. Let Pi represents
IJC

the attack is from a group of attacker, it will be very difficult the port number used by the server in time slot Ti. Then Pi is
to prevent attack. This type of attack is known as Distributed determined by using a pseudo random function which is
Denial of Service attack. The most common type of DoS known only to the server and the client. Besides that, the
attack is bandwidth based attacks. Here, the network will be server and client will use a seed which also is known only to
flooded with unnecessary packets. Then the legitimate user the server and the client. Here a cryptographic key also can
cannot reach the server and get the service. This attack can be used to increase the security of the data transfer. This key
be identified by considering the huge increase in the will not be known to the attacker. Then it will be difficult for
bandwidth. Then prevention methods or correction methods him to decrypt and understand the data. The port can be
can be used. Filtering methods can be used to prevent calculated by using the equation Pi = f (i, k). When a client
bandwidth based or volumetric or network flooding attacks. wants to communicate with the server, it will send contact
Suppose the attack is meant for a single application. Then initiation message to the server. If the server is ready to grant
the bandwidth will not get increased to a greater extent. the request, it will send the reply message to the client which
Here, filtering methods cannot be used to mitigate or prevent also contains a seed. Using this seed and the pseudo random
the application level attacks. A new method should be used function, the client will calculate the next port to which data
to mitigate the application level DDoS attacks. Port-Hopping is to be sent or the next port which will be opened at the
is an efficient way to mitigate the application level DDoS server for receiving the data from the client. After the
attacks. corresponding time period, the client will send the data to the
Different ports will be used to transfer data both in the new port number. Then the attacker will not know the
server side and client side. If the port number is known to the current port number which is used for communication
attacker, then it will be easy for him to launch a directed because the port number will be changed dynamically by
attack. In order to avoid that, port-hopping can be used. In using the pseudo random function and the seed. So, if the
simple way, port-hopping means changing the port number. server receives packets with a different port number, it will
Then the attacker cannot know the port number and cannot reject that packet without any further inspection. Because of
launch a directed attack. Even if the attacker gets the port this reason, the computational resources which are needed to
number, the port number may be changed b that time. Then detect and reject the malicious data packets are reduced.
the attacker cannot launch a directed attack. There are One problem in this method is that the clocks of the
different types of port-hopping methods present. In this server and client will be different. So no time

IJCSRTV1IS050035 www.ijcsrt.org 36
International Journal of Computer Science Research & Technology (IJCSRT)
ISSN: 2321-8827
Vol. 1 Issue 5, October - 2013

synchronization will be there. Then it is possible that the data between keystrokes. The source should be carefully chosen.
may be sent to the port which is not yet opened or a port Next physical phenomenon that can be used is a radioactive
which is closed depending on whether client’s clock is faster source. The time taken by the radioactive source to decay
or slower than that of the server. In this case a clock drift will be different in all the case. This cannot be predicted by
from the server’s clock is calculated for each client by taking any persons. Another physical phenomenon that can be used
the ratio of the value of the client’s clock divided by the for this purpose is atmospheric noise. This is easy to pick up
value of the server’s clock. Then in the next time slot the with a normal radio change. The other one which is taken
data will be sent to the previous port and to the next port for into account is different patterns of background noise from
a small amount of time. Then no time synchronization is any room. The computer fan will produce some background
needed in this case. This is an effective way to prevent the noise. Like this, different True Random Number Generation
DDoS attack in the application level as the port number Sources can be implemented to generate different random
changes dynamically. Then it is difficult for the attacker to numbers for port hopping.
launch a directed attack. Even if the attacker launches a blind
attack and wins in calculating the current port number, then V. CONCLUSION
also it will be difficult to understand the data because the In this paper, different port hopping methods which are
data is encrypted using a cryptographic key which is known used for mitigating Distributed Denial of Service attack is
only to the server and the client. being discussed. In section II, Pseudo Random Number
There are some disadvantages for this method. It will Generation Port Hopping is discussed. Then in next section,
generate random numbers based on mathematical formulae acknowledgement based port hopping is given and in the last
or functions. Because of this, the attacker can easily predict section, a discussion about True Random Number
the random numbers used for calculating the new port Generation port hopping method is also presented.
number. This is deterministic means that the same sequence
of numbers can be reproduced later if the starting point in the ACKNOWLEDGMENT
sequence is known. This method is periodic because the First of all thanks to God Almighty. I am very much
sequence will sooner or later repeat at any point itself. thankful to my family members. I am thankful to our
Principal, HOD, and my guide. I am thankful to my friends
III. ACKNOWLEDGEMENT BASED PORT HOPPING
T for helping me in doing this paper. Last but not least, I am
In acknowledgement based port hopping [2], the ports thankful to all the people who have helped me in doing such
SR
will be changed after getting the acknowledgement from the a paper.
server. First the client will send the data to the server using
the current port which is opened at a specific time. After REFERENCES
IJC

receiving the data packet, the server will send an [1] Zhang Fu, Marina Papatriantafilou, and Philippas Tsigas, “Mitigating
acknowledgement to the client. After reaching the Disatributed Denial of Service Attacks in Multiparty Applications in
the Presence of Clock Drifts,” IEEE Transactions on Dependable and
acknowledgement at the client side, the client will change Secure Computing, Vol. 9, No. 3, May/June 2012
the port number to a new one. Then a directed attack is not [2] Gal Badishi, Amir herzberg, and Idit Keidar, “Keeping Denial-of-
possible by the adversary. Service Attackers in the Dark”, IEEE Transactions on Dependable
One major problem in this method is that, if the and Secure Computing, Vol. 4, No. 3, July-September 2007.
acknowledgement from the server is lost before reaching the [3] Henry C. J. Lee, Vrizlynn L. L. Thing, “Port Hopping for Resilient
Networks”, IEEE 2004.
client side, then the client will wait for the
[4] Xiaowei Yang, David Wetherall, Thomas Anderson, “A DoS-limiting
acknowledgement from the server indefinitely. Then the Network Architecture”, SIGCOMM’05, August 21-26, 2005,
port will remain opened for a long time. Then the attacker Philadelphia, Pennsylvania, USA.
can identify the port number and can launch a directed [5] Stephen de Vries “A Corsaire White Paper:Application Denial of
attack. Here, re-initialization is made by using some seed. Service (DoS) Attacks”1 April 2004.
[6] Arbor Application Brief: “The Growing Threat of Application-Layer
IV. TRUE RANDOM NUMBER GENERATION PORT DDoS Attacks”.2011.
HOPPING [7] http://www.random.org/randomness.
True Random Number Generation port hopping will [8] M. Muthuprasanna, G. Manimaran, “Distributed divide-and-conquer
techniques for effective DDoS attack defences”, Iowa State
make use of the exact randomness from physical phenomena. University.
Then it will bring in this randomness into a computer system. [9] Mudhakar Srivatsa, Arun Iyengar, Jian Yin, and Ling Liu, “A Client-
Here, no mathematical formulae or any pre-calculated values Transparent Approach to Defend Against Denial of Service Attacks”,
are used for calculating the random numbers. For example, 25th IEEE Symposium on Reliable Distributed Systems (SRDS’06).
physical movements of a computer mouse can be used to [10] Tom Anderson, Timothy Roscoe, David Wetherall,
generate the random numbers. The variations in the mouse “Preventing Internet Denial-of-Service with Capabilities”,
movement can be used to get different random numbers. Intel research Berkeley, IRB-TR-03-047, November, 2003.
Another physical phenomenon can be the amount of time

IJCSRTV1IS050035 www.ijcsrt.org 37

Das könnte Ihnen auch gefallen