Karanbir Singh

Work place: Dept of R.I.C, I. K. Gujral Punjab Technical University, Jalandhar, Punjab, INDIA

E-mail: karan_nehra@yahoo.co.in

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Computer Networks, Network Architecture, Network Security, Data Structures and Algorithms

Biography

Karanbir Singh is doing his Ph.D. in the field of Network Security from I. K. Gujral Punjab Technical University, Kapurthala, Punjab, India. He obtained his M.C.A degree from Kurukshetra University, Kurukshetra (Haryana), India. He has a teaching and research experience of more than 12 years. He is the member of various professional bodies like IAEME, UACEE, and IACSIT. He has authored more than 6 publications in the proceedings of various national and international conferences. His research interests are in the fields of Computer Networks, Network Security, and Adhoc Networks.

Author Articles
Distributed Defense: An Edge over Centralized Defense against DDos Attacks

By Karanbir Singh Kanwalvir Singh Dhindsa Bharat Bhushan

DOI: https://doi.org/10.5815/ijcnis.2017.03.05, Pub. Date: 8 Mar. 2017

Distributed Denial of Service (DDoS) attack is a large-scale, coordinated attack on the availability of services of a target/victim system or network resource/service. It can be launched indirectly through many compromised machines on the Internet. The Purpose behind these attacks is exhausting the existing bandwidth and makes servers deny from providing services to legitimate users. Most detection systems depend on some type of centralized processing to analyze the data necessary to detect an attack. In centralized defense, all modules are placed on single point. A centralized approach can be vulnerable to attack. But in distributed defense, all of the defense modules are placed at different points and do not succumb to the high volume of DDoS attack and can discover the attacks timely as well as fight the attacks with more resources. These factors clearly indicate that the DDoS problem requires a distributed solution than the centralized solution. In this paper, we compare both types of defense mechanisms and identify their relative advantages and disadvantages. Later they are compared against some performance metrics to know which kind of solution is best.

[...] Read more.
Other Articles