Distributed Denial of Service Attacks Analysis, Detection, and Mitigation for the Space Control Ground Network: DDoS attacks analysis, detection and mitigation

作者: Ahmed Ramzy Shaaban , Essam Abdelwanees , Mohamed Hussein , None

DOI:

关键词:

摘要: After launching any satellite, it must be controlled from the ground by mission control center (MCC) receiving health state telemetry and issuing telecommand to or execute its so, network of MCC should kept safe kind malicious attacks such as Distributed Denial Service (DDoS). The DDoS could launched deployed either external internal attackers. can defined generally follow: is an attempt exhaust target server resources consume available bandwidth make unavailable normal clients. was simulated using virtual machines – 8 machines. More than 5 types tried attack but 2 were chosen HTTP TCP flood- designed because effectiveness. analysis done before after analyzing captured traffic Wireshark software. According deep results, detection algorithm detect applied attacks. Now attacker are known, so mitigation theses attacked adding blocking rules in windows firewall automatically. Mitigation simply a straightforwardway with some instability. Consequently, new technique will developed block

参考文章(16)
David Gillman, Yin Lin, Bruce Maggs, Ramesh K. Sitaraman, Protecting Websites from Attack with Secure Delivery Networks Computer. ,vol. 48, pp. 26- 34 ,(2015) , 10.1109/MC.2015.116
R.K.C. Chang, Defending against flooding-based distributed denial-of-service attacks: a tutorial IEEE Communications Magazine. ,vol. 40, pp. 42- 51 ,(2002) , 10.1109/MCOM.2002.1039856
Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita, Botnet in DDoS Attacks: Trends and Challenges IEEE Communications Surveys and Tutorials. ,vol. 17, pp. 2242- 2270 ,(2015) , 10.1109/COMST.2015.2457491
Saman Taghavi Zargar, James Joshi, David Tipper, A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks IEEE Communications Surveys and Tutorials. ,vol. 15, pp. 2046- 2069 ,(2013) , 10.1109/SURV.2013.031413.00127
Ibrahim Ghafir, Vaclav Prenosil, Blacklist-based malicious IP traffic detection global conference on communication technologies. pp. 229- 233 ,(2015) , 10.1109/GCCT.2015.7342657
Angelos Stavrou, Daniel Fleck, Constantinos Kolias, On the Move: Evading Distributed Denial-of-Service Attacks Computer. ,vol. 49, pp. 104- 107 ,(2016) , 10.1109/MC.2016.85
Aqeel Sahi, David Lai, Yan Li, Mohammed Diykh, An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment IEEE Access. ,vol. 5, pp. 6036- 6048 ,(2017) , 10.1109/ACCESS.2017.2688460
Vaishali Kansal, Mayank Dave, Proactive DDoS attack detection and isolation international conference on computer communications. pp. 334- 338 ,(2017) , 10.1109/COMPTELIX.2017.8003989
Chenxu Wang, Tony T. N. Miu, Xiapu Luo, Jinhe Wang, SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks IEEE Transactions on Information Forensics and Security. ,vol. 13, pp. 559- 573 ,(2018) , 10.1109/TIFS.2017.2758754