ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Border Gateway Protocol Performance and Its Protection against Disturbed Denial of Service Attack

Journal: Bonfring International Journal of Research in Communication Engineering (Vol.4, No. 1)

Publication Date:

Authors : ; ; ;

Page : 05-09

Keywords : BGP; IPV6; IPV4; Tunneling; DDoS; DNS;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Now a day the internet has become very popular in the world. Simple work to complicated work you can accomplish by using internet. Such popularity leads to chances of exhaustion of Internet protocol version 4 which is currently available. To overcome such problem, IPv6 comes in the picture. IPv6 provides more address space, better addressing mechanism and equipped with high security protocol. Unfortunately these IP versions are not compatible to each other. To make such protocol compatible, various tunnelling mechanism are using. Along with tunnelling mechanism, various inter-networking attack like DDoS etc. become serious issues for various routing protocol e.g. Border Gateway Protocol (BGP). Such attacks make an impact to the performance of system such as delay, more updates, insufficient bandwidth utilizations and loss of valuable signal. In this paper we propose a tunnelling mechanism which is based on the Border Gateway Protocol (BGP). BGP is an inter domain routing protocol basically designed to provide loop-free routing links between organizations. BGP is designed to work over a trustable transport layer protocol; it uses Transport Control Protocol TCP port 179 as the transport protocol layer because TCP is a connection-oriented protocol. We have also proposed two theorem to secure the Internet from Domain Name Server (DNS), Distributed Denial of service(DDoS) attacks which is using Border gateway routing protocol, first one to isolate defected region and correct region, suppressed unnecessary updates without hampering any effect on the define path. Secondly, to cut down the route swinging which is responsible to generates hell lot of updates and the paths selected are scrutinized to remove the attacked links. Our simulation shows the methods to eliminate false number of unwanted updates under the influence of the attacks, and isolate the effected part from the network.

Last modified: 2015-01-07 15:46:46