Launching Low-Rate DoS Attacks with Cache-Enabled WiFi Offloading

Author(s):  
Zhicheng Liu ◽  
Junxing Zhang
Keyword(s):  
2021 ◽  
Vol 565 ◽  
pp. 229-247
Author(s):  
Dan Tang ◽  
Siqi Zhang ◽  
Jingwen Chen ◽  
Xiyin Wang
Keyword(s):  

2010 ◽  
Vol 54 (15) ◽  
pp. 2711-2727 ◽  
Author(s):  
Gabriel Maciá-Fernández ◽  
Rafael A. Rodríguez-Gómez ◽  
Jesús E. Díaz-Verdejo

Author(s):  
Gabriel Maciá-Fernández ◽  
Jesús E. Díaz-Verdejo ◽  
Pedro García-Teodoro
Keyword(s):  

Sensors ◽  
2019 ◽  
Vol 20 (1) ◽  
pp. 189 ◽  
Author(s):  
Sijia Zhan ◽  
Dan Tang ◽  
Jianping Man ◽  
Rui Dai ◽  
Xiyin Wang

Low-rate denial of service (LDoS) attacks reduce the quality of network service by sending periodical packet bursts to the bottleneck routers. It is difficult to detect by counter-DoS mechanisms due to its stealthy and low average attack traffic behavior. In this paper, we propose an anomaly detection method based on adaptive fusion of multiple features (MAF-ADM) for LDoS attacks. This study is based on the fact that the time-frequency joint distribution of the legitimate transmission control protocol (TCP) traffic would be changed under LDoS attacks. Several statistical metrics of the time-frequency joint distribution are chosen to generate isolation trees, which can simultaneously reflect the anomalies in time domain and frequency domain. Then we calculate anomaly score by fusing the results of all isolation trees according to their ability to isolate samples containing LDoS attacks. Finally, the anomaly score is smoothed by weighted moving average algorithm to avoid errors caused by noise in the network. Experimental results of Network Simulator 2 (NS2), testbed, and public datasets (WIDE2018 and LBNL) demonstrate that this method does detect LDoS attacks effectively with lower false negative rate.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 43920-43943 ◽  
Author(s):  
Wu Zhijun ◽  
Li Wenjing ◽  
Liu Liang ◽  
Yue Meng
Keyword(s):  

2014 ◽  
Vol 484-485 ◽  
pp. 1063-1066
Author(s):  
Kui Liang Xia

The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference.


Author(s):  
Nahush Chaturvedi ◽  
Hrushikesha Mohanty

Low rate attacks, or Denial-of-Service (DoS) attacks of the occasional misbehaviour, can throttle the throughput of robust timed-protocols, like the Transmission Control Protocol(TCP), by creating either periodic or exponentially distributed outages, or transmission disruptions. Such attacks are as effective as full-fledged DoS with high undetectability of the misbehaving network entity. In this paper, we present a mathematical model of Low-Rate. randomly occurring, Denial-of-Service attacks. By viewing the process as a twostate Continuous-Time Markov Chain(CTMC), we have successfully computed the transition and state probabilities of a compromised network entity that can behave normally, while in the normal state. and abnormally, when in the abnormal state.


Sign in / Sign up

Export Citation Format

Share Document