Mitigation Against Denial-of-Service Flooding and Malformed Packet Attacks

被引:3
|
作者
Patil, Arvind R. Bhagat [1 ]
Thakur, Nileshsingh V. [2 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Nagpur, Maharashtra, India
[2] Nagpur Inst Technol, Nagpur, Maharashtra, India
关键词
Denial of service; Flood attack; Malformed packets; Mitigation; DEFENSE;
D O I
10.1007/978-981-13-1165-9_30
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial-of-service attack is really a concern and challenging task to deal with due to the extensive use of advanced technologies by attackers. The denial-of-service flood attacks can consume the network resource such as available bandwidth, CPU, memory, thus affecting the normal functioning of the working network. The arrival of unknown source IP addresses, volume of incoming requests from these IP's and malformed packets invalid flag settings and other invalid packet conditions are the key parameters for filtering decision. In this paper, these features are explored to mitigate DoS attacks effectively. The performance evaluation of the proposed mechanism is done using qualitative and quantitative parameters.
引用
收藏
页码:335 / 342
页数:8
相关论文
共 50 条
  • [21] Protecting a Federated Database Infrastructure against Denial-of-Service Attacks
    Ansper, Arne
    Buldas, Ahto
    Freudenthal, Margus
    Willemson, Jan
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2013, 2013, 8328 : 26 - 37
  • [22] Novel Denial-of-Service Attacks Against LoRaWAN on MAC Layer
    Chen, Mi
    Ben-Othman, Jalel
    Mokdad, Lynda
    IEEE COMMUNICATIONS LETTERS, 2023, 27 (11) : 3123 - 3126
  • [23] FloodShield: Securing the SDN Infrastructure Against Denial-of-Service Attacks
    Zhang, Menghao
    Bi, Jun
    Bai, Jiasong
    Li, Guanyu
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 681 - 692
  • [24] Distributed denial-of-service attacks against HTTP/2 services
    Erwin Adi
    Zubair A. Baig
    Philip Hingston
    Chiou-Peng Lam
    Cluster Computing, 2016, 19 : 79 - 86
  • [25] Resilient Consensus of Multiagent Systems Against Denial-of-Service Attacks
    Zuo, Zhiqiang
    Cao, Xiong
    Wang, Yijing
    Zhang, Wentao
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (04): : 2664 - 2675
  • [26] Distributed denial-of-service attacks against HTTP/2 services
    Adi, Erwin
    Baig, Zubair A.
    Hingston, Philip
    Lam, Chiou-Peng
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 79 - 86
  • [27] Investigation of Simple Denial-of-Service Attacks
    Voitovych, Olesya
    Baryshev, Yurii
    Kolibabchuk, Eduard
    Kupershtein, Leonid
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 145 - 148
  • [28] Defeating Reflector Based Denial-of-Service Attacks using Single Packet Filters
    Sairam, Ashok Singh
    Subramaniam, Late Ashish
    Barua, Gautam
    2010 5TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2010,
  • [29] Countering denial-of-service attacks using congestion triggered packet sampling and filtering
    Huang, Y
    Pullen, JM
    TENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2001, : 490 - 494
  • [30] Denial-of-service attacks and countermeasures on BitTorrent
    Lehmann, Matheus Brenner
    Santos, Flavio Roberto
    Gaspary, Luciano Paschoal
    Barcellos, Marinho Pilla
    COMPUTER NETWORKS, 2012, 56 (15) : 3479 - 3498