Modeling and Simulation of Low Rate of Denial of Service Attacks

Article Preview

Abstract:

The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1063-1066

Citation:

Online since:

January 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] SPECHT SM, LEE R B. Distributed denial of service: taxonomies of Attacks, tools, and countermeasures . Proceedings of the 17th Int'l Conf . 2004. 536-543.

Google Scholar

[2] LUO X, CHANG RK C. On a new class of pulsing denial-of-service attacks and the defense . Network and Distributed System Security Symposium (NDSS'05) . San Diego, CA, 2005. 2-5.

Google Scholar

[3] Wang Li, WU hair, HU Gu Yu. Distributed Intrusion Detection System . Journal of Software, 2002, 13 (8): 1723-1727.

Google Scholar

[4] Sun Hongjie, Fang Bin-Xing, Zhang Hongli. DDoS attacks based on the link feature detection method . Communications Technology, 2007, 28 (2) : 88-93. SUN HJ, FANG XB, ZHANG H L. DDoS attacks detection based on link character . Journal on Communications, 2007, 28 (2) : 88-93.

Google Scholar

[5] Ren Xun Yi, WANG Ru-chuan, Wang Haiyan. Detect DDoS attacks based on self-similarity of the wavelet analysis method . Communications, 2006, 27 (5) : 6-11.

Google Scholar