- Version
- Download 12
- File Size 758.75 KB
- File Count 1
- Create Date September 5, 2024
- Last Updated September 5, 2024
A Hybrid Cryptographic Algorithm for Web Security against Distributed Denial of Service Attacks
Abstract
To prevent disruptions on the internet caused by distributed denial of service (DDoS), the study presents a hybrid cryptographic algorithm that enhances web security. To enhance security and mitigate the effects of DDoS attacks, the proposed algorithm combines symmetric and asymmetric encryption techniques with traffic analysis. First, Blowfish encryption is employed in the fast and efficient processing of large sizes of data. The next layer uses RSA encryption to protect the Blowfish ciphertext while being transmitted through unsafe channels. For this reason, AES encryption is used for encrypting RSA ciphertext as it has strong security features and can use hardware acceleration. Consequently, traffic behavior analysis including such like DDoS attack detection systems is integrated into this multi-layered strategy to detect unusual patterns that can be indications of DDoS attacks. Numerous simulations and field tests have proven this method correct since fewer false alarms were raised by it and there was a remarkable decline in legitimate traffic disturbances. The algorithm is highly scalable and portable hence it can be used in different web environments offering strong protection thus ensuring availability and integrity thereby allowing safe online interaction and avoiding data loss during these processes. The performance scalability of a cryptographic algorithm concerning data length is analyzed in this study, especially encryption and decryption times. The graphs show that there exists a linear relationship between the length of the data and the time for encryption and decryption. Such a pattern of scaling suggests that larger amounts of data will require more computations, which then strengthens the security. This characteristic not only protects such algorithms from the fast processing of huge amounts of encrypted information by intruders but also proves suitability for different environments with varied data sizes thereby providing adequate security.
Keywords: Symmetric algorithm, Information security, Cybersecurity, Web security, Asymmetric algorithm.