A Novel Online Technique to Characterize and Mitigate DoS Attacks using EPSD and Honeypots

作者: Anjali Sardana , Bhavana Gandhi , Ramesh Joshi

DOI: 10.1007/978-1-4020-6266-7_10

关键词:

摘要: Denial of Service (DoS) attacks pose a severe security threat to the steady functioning any network. These aim at depleting resources server or an administrative network by overwhelming it with enormous and useless traffic. The outcome this is fact that legitimate users are denied service. Though array schemes has been proposed for detection presence these attacks, characterizing flows as normal flow malicious one, identifying sources mitigating effects once they have detected, there still dearth complete frameworks encompass multiple stages process defense against DoS attacks. In paper, we propose novel framework which deals characterization TCP UDP flows, identification source characterized attack influence attack. achieved innovative Exactly Periodic Subspace Decomposition (EPSD) based approach, whereas proactive roaming honeypot scheme deployed mitigation same. We validate effectiveness approach simulation in ns-2 on Linux platform.

参考文章(10)
K. G. Anagnostakis, K. Xinidis, A. D. Keromytis, E. Markatos, S. Sidiroglou, P. Akritidis, Detecting targeted attacks using shadow honeypots usenix security symposium. pp. 9- 9 ,(2005) , 10.7916/D8WM1PS8
Chen-Mou Cheng, H.T. Kung, Koan-Sin Tan, Use of spectral analysis in defense against DoS attacks global communications conference. ,vol. 3, pp. 2143- 2148 ,(2002) , 10.1109/GLOCOM.2002.1189011
P.L. Felbig, D.M. Etter, S.D. Stearns, A software tool for comparing spectral estimation techniques asilomar conference on signals, systems and computers. ,vol. 1, pp. 371- 375 ,(1989) , 10.1109/ACSSC.1989.1200815
D.D. Muresan, T.W. Parks, Orthogonal, exactly periodic subspace decomposition IEEE Transactions on Signal Processing. ,vol. 51, pp. 2270- 2279 ,(2003) , 10.1109/TSP.2003.815381
Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb Znati, Rami Melhem, Daniel Mossé, Design and analysis of a replicated elusive server scheme for mitigating denial of service attacks Journal of Systems and Software. ,vol. 73, pp. 15- 29 ,(2004) , 10.1016/J.JSS.2003.09.012
F. Sultan, K. Srinivasan, D. Iyer, L. Iftode, Migratory TCP: connection migration for service continuity in the Internet international conference on distributed computing systems. pp. 469- 470 ,(2002) , 10.1109/ICDCS.2002.1022294
Rong-Ching Wu, Ta-Peng Tsao, Theorem and application of adjustable spectrum IEEE Power & Energy Magazine. ,vol. 18, pp. 372- 376 ,(2003) , 10.1109/TPWRD.2002.807457
S.M. Khattab, C. Sangpachatanaruk, R. Melhem, D. l Mosse, T. Znati, Proactive server roaming for mitigating denial-of-service attacks international conference on information technology research and education. pp. 286- 290 ,(2003) , 10.1109/ITRE.2003.1270623
R. C. Wu, T. P. Tsao, Theorem and Application of Adjustable Spectrum IEEE Power & Energy Magazine. ,vol. 22, ,(2002) , 10.1109/MPER.2002.4312504
Rivest, The MD5 Message-Digest Algorithm RFC1321. ,(1992)