Applying Sigmoid Filter for Detecting the Low-Rate Denial of Service Attacks

被引:0
|
作者
Rabie, Rashed [1 ]
Drissi, Maroua [2 ]
机构
[1] Univ Dist Columbia, Sch Engn & Appl Sci, Elect & Comp Engn Dept, Washington, DC 20008 USA
[2] Mohammed V Univ, Fac Sci, LRIT Assoc Unit CNRST, URAC 29, Rabat 10000, Morocco
关键词
Denial of Service (DoS); Distributed DoS; NS-3; Simulation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper focuses on optimizing the sigmoid filter for detecting Low-Rate DoS attacks. Though sigmoid filter could help for detecting the attacker, it could severely affect the network efficiency. Unlike high rate attacks, Low-Rate DoS attacks such as "Shrew" and "New Shrew" are hard to detect. Attackers choose a malicious low-rate bandwidth to exploit the TCP's congestion control window algorithm and the re-transition time-out mechanism. We simulated the attacker traffic by editing using NS3. The Sigmoid filter was used to create a threshold bandwidth filter at the router that allowed a specific bandwidth, so when traffic that exceeded the threshold occurred, it would be dropped, or it would be redirected to a honey-pot server, instead. We simulated the Sigmoid filter using MATLAB and took the attacker's and legitimate user's traffic generated by NS3 as the input for the Sigmoid filter in the MATLAB. We run the experiment three times with different threshold values correlated to the TCP packet size. We found the probability to detect the attacker traffic as follows: the first was 25%, the second 50% and the third 60%. However, we observed a drop in legitimate user traffic with the following probabilities, respectively: 75%, 50%, and 85%.
引用
收藏
页码:450 / 456
页数:7
相关论文
共 50 条
  • [1] A Particle Filter-based Approach for Effectively Detecting Low-rate Denial of Service Attacks
    Wu Zhijun
    Jiang Jun
    Yue Meng
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 86 - 90
  • [2] Survey on research and progress of low-rate denial of service attacks
    Yang, J.-H. (yang@cernet.edu.cn), 1600, Chinese Academy of Sciences (25):
  • [3] On a novel pattern of distributed low-rate denial of service attacks
    Liu, Xiao-Ming
    Cheng, Gong
    Zhang, Miao
    Luo, Shou-Shan
    Journal of China Universities of Posts and Telecommunications, 2011, 18 (SUPPL.2): : 113 - 118
  • [4] Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey
    Rios, Vinicius De Miranda
    Inacio, Pedro R. M.
    Magoni, Damien
    Freire, Mario M.
    IEEE ACCESS, 2022, 10 : 76648 - 76668
  • [5] On the effect of router buffer sizes on low-rate denial of service attacks
    Sarat, S
    Terzis, A
    ICCCN 2005: 14th International Conference on Computer Communications and Networks, Proceedings, 2005, : 281 - 286
  • [6] Flow-oriented detection of low-rate denial of service attacks
    Wu, Zhijun
    Hu, Ran
    Yue, Meng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (01) : 130 - 141
  • [7] On the Detection of Low-Rate Denial of Service Attacks at Transport and Application Layers
    Vedula, Vasudha
    Lama, Palden
    Boppana, Rajendra, V
    Trejo, Luis A.
    ELECTRONICS, 2021, 10 (17)
  • [8] On a Game Theoretic Approach to Detect the Low-Rate Denial of Service Attacks
    Cotae, Paul
    Rabie, Rashed
    2018 12TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2018, : 19 - 26
  • [9] Novel mechanism to defend against low-rate denial-of-service attacks
    Wei, Wei
    Dong, Yabo
    Lu, Dongming
    Jin, Guang
    Lao, Honglan
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 261 - 271
  • [10] Detection and response of low-rate TCP-targeted denial of service attacks
    Wei, Wei
    Dong, Ya-Bo
    Lu, Dong-Ming
    Jin, Guang
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2008, 42 (05): : 757 - 762