ResMon: Securing Resource Consumption of Critical Infrastructure from Wanton Applications

作者: Emmanuel C. , Sunday A. , Jean-Paul Ainam , Ogu Chiemela

DOI: 10.5120/IJCA2016908814

关键词:

摘要: Hackers have devised a recent technique of infiltrating critical infrastructure with wanton applications that gulp at the limited resources possessed by these for meeting needs and deadlines. Also reality is fact hackers could breach already existing trusted or software on bug them malicious codes plunge into state wantonness; consuming limited, making none (or insufficient) available other, equally depend fair portion same to meet their deadlines requirements. This development portends next generation denial service (DoS) distributed (DDoS) attacks infrastructure, where all required discover vulnerabilities in running deliver escalate new wantonness, resulting service. Proposals exist literature forestall an occurrence such attacks, but some not previously been tested; one being documented [1]. research experimental implementation theoretical model proposed cited article, order test validate its workability results. An prototype – codenamed “ResMon” built validated within Ubuntu Linux operating system environment. General Terms Network Security, Denial Service, Critical Infrastructure.

参考文章(8)
Thomer M. Gil, Massimiliano Poletto, MULTOPS: a data-structure for bandwidth attack detection usenix security symposium. pp. 3- 3 ,(2001) , 10.21236/ADA401819
Jérôme Francois, Issam Aib, Raouf Boutaba, FireCol: a collaborative protection network for the detection of flooding DDoS attacks IEEE ACM Transactions on Networking. ,vol. 20, pp. 1828- 1841 ,(2012) , 10.1109/TNET.2012.2194508
Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, Scott Shenker, DDoS defense by offense ACM Transactions on Computer Systems. ,vol. 28, pp. 3- ,(2010) , 10.1145/1731060.1731063
Debasish Das, Utpal Sharma, D. K. Bhattacharyya, Detection of HTTP flooding attacks in multiple scenarios Proceedings of the 2011 International Conference on Communication, Computing & Security - ICCCS '11. pp. 517- 522 ,(2011) , 10.1145/1947940.1948047
Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems ACM Computing Surveys. ,vol. 39, pp. 3- ,(2007) , 10.1145/1216370.1216373
D.K.Y. Yau, J.C.S. Lui, Feng Liang, Yeung Yam, Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles IEEE ACM Transactions on Networking. ,vol. 13, pp. 29- 42 ,(2005) , 10.1109/TNET.2004.842221
Emmanuel C Ogu, SA Idowu, OA Adesegun, A Theoretical Model for Real-Time Resource Monitoring for Securing Computing Infrastructure against DoS and DDoS Attacks International Journal of Advanced Research in Computer Science. ,vol. 6, pp. 132- 136 ,(2015) , 10.26483/IJARCS.V6I2.2447
Vern Paxson, Bro: a system for detecting network intruders in real-time usenix security symposium. pp. 3- 3 ,(1998)