Research of Three-Level Detection Algorithm against Low-Rate Denial of Service Attacks

2011 ◽  
Vol 403-408 ◽  
pp. 2325-2328
Author(s):  
Yuan Bai ◽  
Chui Yi Xie ◽  
Jian Cheng Qin

Three-Level detection algorithm is provided to detect low-rate denial of service attacks. The networks abnormities are caught in the first level; In the second level the flooding and low-rate denial of service(DoS) are divided; And then the Low-Rate DoS is detected accurately using frequency transfer method in the third level. Considering the application of networks, Low-Rate DoS attacks are detected and confirmed in Three-Level detection algorithm. Comparing with single level detection method, the most complex procedure is left behind to reduce detecting overhead. The simulation results certificate the feasibility of the algorithm.

Author(s):  
Nahush Chaturvedi ◽  
Hrushikesha Mohanty

Low rate attacks, or Denial-of-Service (DoS) attacks of the occasional misbehaviour, can throttle the throughput of robust timed-protocols, like the Transmission Control Protocol(TCP), by creating either periodic or exponentially distributed outages, or transmission disruptions. Such attacks are as effective as full-fledged DoS with high undetectability of the misbehaving network entity. In this paper, we present a mathematical model of Low-Rate. randomly occurring, Denial-of-Service attacks. By viewing the process as a twostate Continuous-Time Markov Chain(CTMC), we have successfully computed the transition and state probabilities of a compromised network entity that can behave normally, while in the normal state. and abnormally, when in the abnormal state.


Author(s):  
Lawan A. Mohammed ◽  
Biju Issac

This chapter shows that the security challenges posed by the 802.11 wireless networks are manifold and it is therefore important to explore the various vulnerabilities that are present with such networks. Along with other security vulnerabilities, defense against denial of service attacks is a critical component of any security system. Unlike wired networks where denial of service attacks has been extensively studied, there is a lack of research for preventing such attacks in wireless networks. In addition to various vulnerabilities, some factors leading to different types of denial of service (DoS) attacks and some defense mechanisms are discussed in this chapter. This can help to better understand the wireless network vulnerabilities and subsequently more techniques and procedures to combat these attacks may be developed by researchers.


Sensors ◽  
2019 ◽  
Vol 20 (1) ◽  
pp. 189 ◽  
Author(s):  
Sijia Zhan ◽  
Dan Tang ◽  
Jianping Man ◽  
Rui Dai ◽  
Xiyin Wang

Low-rate denial of service (LDoS) attacks reduce the quality of network service by sending periodical packet bursts to the bottleneck routers. It is difficult to detect by counter-DoS mechanisms due to its stealthy and low average attack traffic behavior. In this paper, we propose an anomaly detection method based on adaptive fusion of multiple features (MAF-ADM) for LDoS attacks. This study is based on the fact that the time-frequency joint distribution of the legitimate transmission control protocol (TCP) traffic would be changed under LDoS attacks. Several statistical metrics of the time-frequency joint distribution are chosen to generate isolation trees, which can simultaneously reflect the anomalies in time domain and frequency domain. Then we calculate anomaly score by fusing the results of all isolation trees according to their ability to isolate samples containing LDoS attacks. Finally, the anomaly score is smoothed by weighted moving average algorithm to avoid errors caused by noise in the network. Experimental results of Network Simulator 2 (NS2), testbed, and public datasets (WIDE2018 and LBNL) demonstrate that this method does detect LDoS attacks effectively with lower false negative rate.


2018 ◽  
Vol 26 (0) ◽  
pp. 257-266
Author(s):  
Shotaro Usuzaki ◽  
Yuki Arikawa ◽  
Hisaaki Yamaba ◽  
Kentaro Aburada ◽  
Shin-Ichiro Kubota ◽  
...  

2010 ◽  
Vol 14 (5) ◽  
pp. 489-491 ◽  
Author(s):  
Changwang Zhang ◽  
Jianping Yin ◽  
Zhiping Cai ◽  
Weifeng Chen

2014 ◽  
pp. 95-104
Author(s):  
Andrian Piskozub

The aim of this paper is to understand reasons why denial of service (DoS) attacks are happening; to find ways how to avoid these attacks or lessen their influence; to work out strategy of detecting and preventing these attacks.


Sign in / Sign up

Export Citation Format

Share Document