Mitigation Against Denial-of-Service Flooding and Malformed Packet Attacks

被引:3
|
作者
Patil, Arvind R. Bhagat [1 ]
Thakur, Nileshsingh V. [2 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Nagpur, Maharashtra, India
[2] Nagpur Inst Technol, Nagpur, Maharashtra, India
关键词
Denial of service; Flood attack; Malformed packets; Mitigation; DEFENSE;
D O I
10.1007/978-981-13-1165-9_30
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Denial-of-service attack is really a concern and challenging task to deal with due to the extensive use of advanced technologies by attackers. The denial-of-service flood attacks can consume the network resource such as available bandwidth, CPU, memory, thus affecting the normal functioning of the working network. The arrival of unknown source IP addresses, volume of incoming requests from these IP's and malformed packets invalid flag settings and other invalid packet conditions are the key parameters for filtering decision. In this paper, these features are explored to mitigate DoS attacks effectively. The performance evaluation of the proposed mechanism is done using qualitative and quantitative parameters.
引用
收藏
页码:335 / 342
页数:8
相关论文
共 50 条
  • [31] Denial-of-service attacks rip the Internet
    Garber, L
    COMPUTER, 2000, 33 (04) : 12 - 17
  • [32] Optimizing the pulsing denial-of-service attacks
    Luo, XP
    Chang, RKC
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 582 - 591
  • [33] Speculative Denial-of-Service Attacks in Ethereum
    Yaish, Aviv
    Qin, Kaihua
    Zhou, Liyi
    Zohar, Aviv
    Gervais, Arthur
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 3531 - 3548
  • [34] Handling Distributed Denial-of-Service Attacks
    Janczewski, Lech J.
    Information Security Technical Report, 2001, 6 (03): : 37 - 44
  • [35] A Comprehensive Review of Distributed Denial-of-Service (DDoS) Attacks: Techniques and Mitigation Strategies
    Alomari, Mariam
    Alsadah, Sharifa
    Aldahmash, Noura
    Alghulaygah, Hana
    Alogaiel, Razan
    Saqib, Nazar Abbas
    PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 215 - 222
  • [36] Design and Development of Proactive Models for Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks
    Nagesh, H. R.
    Sekaran, K. Chandra
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 168 - 176
  • [37] PFS: Probabilistic Filter Scheduling Against Distributed Denial-of-Service Attacks
    Seo, Dongwon
    Lee, Heejo
    Perrig, Adrian
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 9 - 17
  • [38] Applying pattern detection network security against Denial-of-Service attacks
    Tsvetanov, Tsvetomir
    Simeonov, Stanislav
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VII, PROCEEDINGS, 2006, : 314 - +
  • [40] Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor
    Jansen, Rob
    Vaidya, Tavish
    Shen, Micah
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1823 - 1840