A Method for Investigating Distributed Denial of Service (DDoS) Attacks
نویسنده
چکیده
Prevention of Distributed Denial of Service (DDoS) attacks before they achieve their intrusive objectives is a critical problem in network security. This is because the attacks rapidly build up and flood the networks with disruptive packets that consume network bandwidth within a short range of timestamp. Consequently, network activities are suddenly shutdown and legitimate users that are present on the networks together with critical operations such as data update, audit hook that records suspicious events, etc are inevitably deactivated. Unfortunately, network detectors that report network intrusions are flawed with imprecise reporting of complex attacks and they lack ability to establish patterns of attacks. Similarly, system administrators that review the audit logs to correct these errors often adopt heuristic rules and manual methods. Nevertheless, these processes are inefficient and they are susceptible to lots of errors whenever large quantities of complex alerts of closely related attacks are processed. For these reasons, how to promptly and correctly review the audit logs so that DDoS attacks would be thwarted in progress is an active research issue in network security. Thus, this paper proposes an automated DoS-Analyzer model for investigating these problems. The analyzer clustered suspicious alerts using the arrival time, addresses, timestamp, protocol, etc to substantiate hidden patterns of attacks that were present in the audit log. In addition, the model was broadly evaluated on six datasets that included synthetic and realistic attacks and the results substantiated patterns of attacks and how they built up over time.
منابع مشابه
Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملHF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملDefending Wireless Infrastructure Against the Challenge of DDoS Attacks
This paper addresses possible Distributed Denial-of-Service (DDoS) attacks toward the wireless Internet including the Wireless Extended Internet, the Wireless Portal Network, and the Wireless Ad Hoc network. We propose a conceptual model for defending against DDoS attacks on the wireless Internet, which incorporates both cooperative technological solutions and economic incentive mechanisms buil...
متن کاملExplicit Query based Detection and Prevention Techniques for DDOS in MANET
The wireless adhoc networks are highly vulnerable to distributed denial of service (DDoS) attacks because of its unique characteristics such as open network architecture and shared wireless medium. A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its legitimate users. The denial of service (DOS...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009