Border gateway protocol artificial optimization to improve network performance on ddos attacks

Author: 
Taruna Devi., Dr.Rakesh Kumar and Palwinder Kaur

In the current Internet Routing system, various policies of Border Gateway Protocol are followedto process the routing between various nodes. In BGP current scenario, various security issues are coming in the process of transmission like less security and hard to control the traffic on online servers. Due to the popularity of internet, everyone uses it to complete his or her simplest to thehard working structure. For the transmission of data, various protocols are there. According to recent study, IPV4 used to transmit data from one location to other over the internet.But one more protocol which resolves all the transmission issues over an internet regarding transmission address is IPv6. IPv6 protocol provides secure transmission over the Internet with maximum space of addresses and better allocation. For performance enhancement of these protocols with the internet, various other algorithms are used to improve the performance of system. Some of the attacks like DDOS attacks still affect the system and system protocols like BGP. These attacks reduce the performance of the system with a lot of delay for transmission, packet drop issues for important transmission and some other issues regarding bandwidth allocation. Due to all these issues, the proposed approach provides secure routing process withoutlooping the routes along with intelligent direction finding system. In this process, the two different procedures are used to make the transmission secure over the internet. The proposed approach uses fitness function along with artificial intelligence to achieve this target. The overall process is tested with the DDoS flood attack to check the security issues and their solutions. The proposed approach check the attacked region and accurate working region in their initial step. It can beprocessed by finding unwanted requests on a particular region. After the successful detection of theregion, the proposed architecture find out the source of unwanted requests from the overall processing. Detected links are classified and system rejects the updates from that link immediately. Proposed architecture is working in asecure and efficient way to eliminate the unwanted users from the network and act as flood attack with unwanted updates from a particular source toimprove throughput and packet delivery rate.

Download PDF: 
DOI: 
DOI: http://dx.doi.org/10.24327/ijcar.2017.5171.0664
Select Volume: 
Volume6