Research of Three-Level Detection Algorithm against Low-Rate Denial of Service Attacks

Article Preview

Abstract:

Three-Level detection algorithm is provided to detect low-rate denial of service attacks. The networks abnormities are caught in the first level; In the second level the flooding and low-rate denial of service(DoS) are divided; And then the Low-Rate DoS is detected accurately using frequency transfer method in the third level. Considering the application of networks, Low-Rate DoS attacks are detected and confirmed in Three-Level detection algorithm. Comparing with single level detection method, the most complex procedure is left behind to reduce detecting overhead. The simulation results certificate the feasibility of the algorithm.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 403-408)

Pages:

2325-2328

Citation:

Online since:

November 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Aleksandar Kuzmanovic, Edward W. Knightly: Low-Rate TCP -Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants). SIGCOMM'03(2003), pp.75-85.

DOI: 10.1145/863955.863966

Google Scholar

[2] R. Srikant, in: The Mathematics of Internet Congestion Control, edited by Boston, MA: Birkhäuser(2004).

Google Scholar

[3] Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro García-Teodoro: Mathematical Model for Low-Rate DoS Attacks Against Application Servers (IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009).

DOI: 10.1109/tifs.2009.2024719

Google Scholar

[4] Chia-Wei Chang, Seungjoon Lee, Bill Lin and Jia Wang: The taming of the shrew: mitigating Low-Rate TCP-targeted attack. 29th IEEE International Conference on Distributed Computing Systems(2009). pp.37-145.

DOI: 10.1109/icdcs.2009.9

Google Scholar

[5] Aleksandar Kuzmanovic, Edward W. Knightly: Low-rate TCP-targeted denial of service attacks and counter strategies(IEEE/ACM TRANSACTIONS ON NETWORKING, 2006).

DOI: 10.1109/tnet.2006.880180

Google Scholar

[6] Petros Efstathopoulos: Practical study of a defense against Low-rate TCP-targeted DoS attack(Internet Technology and Secured Transactions, 2009).

DOI: 10.1109/icitst.2009.5402593

Google Scholar

[7] Yu Chen, Kai Hwang: Spectral analysis of TCP flows for defense against Reduction- of-Quality attacks. IEEE International Conference on Communications 2007(2007), pp.24-28.

DOI: 10.1109/icc.2007.204

Google Scholar

[8] Hao Chen, Yu Chen. A novel embedded accelerator for online detection of Shrew DDoS Attacks. The 2008 International Conference on Networking, Architecture, and Storage, Chongqing, China(2008), pp.365-372.

DOI: 10.1109/nas.2008.13

Google Scholar

[9] YU CHEN, KAI HWANG, YU-KWONG KWOK: Collaborative Defense against Periodic Shrew DDoS Attacks in Frequency Domain(ACM Transactions on Information and System Security, 2005).

DOI: 10.1109/lcn.2005.70

Google Scholar