Mitigation Against Denial-of-Service Flooding and Malformed Packet Attacks

被引:3
|
作者
Patil, Arvind R. Bhagat [1 ]
Thakur, Nileshsingh V. [2 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Nagpur, Maharashtra, India
[2] Nagpur Inst Technol, Nagpur, Maharashtra, India
关键词
Denial of service; Flood attack; Malformed packets; Mitigation; DEFENSE;
D O I
10.1007/978-981-13-1165-9_30
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial-of-service attack is really a concern and challenging task to deal with due to the extensive use of advanced technologies by attackers. The denial-of-service flood attacks can consume the network resource such as available bandwidth, CPU, memory, thus affecting the normal functioning of the working network. The arrival of unknown source IP addresses, volume of incoming requests from these IP's and malformed packets invalid flag settings and other invalid packet conditions are the key parameters for filtering decision. In this paper, these features are explored to mitigate DoS attacks effectively. The performance evaluation of the proposed mechanism is done using qualitative and quantitative parameters.
引用
收藏
页码:335 / 342
页数:8
相关论文
共 50 条
  • [1] IP Address-Based Mitigation Against Denial-of-Service Flooding Attacks
    Patil, Arvind R. Bhagat
    Thakur, Nileshsingh, V
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS, ICTIS 2018, VOL 2, 2019, 107 : 377 - 389
  • [2] Defending against flooding-based distributed denial-of-service attacks: A tutorial
    Chang, RKC
    IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 42 - 51
  • [3] Automated immunization against denial-of-service attacks featuring stochastic packet inspection
    Kim, J
    Cho, J
    Moon, J
    GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS, 2005, 3795 : 25 - 34
  • [4] Denial-of-service attacks
    Neumann, PG
    COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 136 - 136
  • [5] Statistical signatures for early detection of flooding denial-of-service attacks
    Haggerty, J
    Shi, Q
    Merabti, M
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 327 - 341
  • [6] Analysis of denial-of-service attacks on denial-of-service defensive measures
    Wang, BT
    Schulzrinne, H
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1339 - 1343
  • [7] D-WARD: A source-end defense against flooding denial-of-service attacks
    Mirkovic, J
    Reiher, P
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) : 216 - 232
  • [8] An IP traceback technique against denial-of-service attacks
    Chen, ZL
    Lee, MC
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 96 - 104
  • [9] Cryptographic salt: A countermeasure against denial-of-service attacks
    Park, D
    Kim, J
    Boyd, C
    Dawson, E
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 334 - 343
  • [10] An overlay protection layer against denial-of-service attacks
    Beitollahi, Hakem
    Deconinck, Geert
    2008 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-8, 2008, : 328 - +