Applying Sigmoid Filter for Detecting the Low-Rate Denial of Service Attacks

被引:0
|
作者
Rabie, Rashed [1 ]
Drissi, Maroua [2 ]
机构
[1] Univ Dist Columbia, Sch Engn & Appl Sci, Elect & Comp Engn Dept, Washington, DC 20008 USA
[2] Mohammed V Univ, Fac Sci, LRIT Assoc Unit CNRST, URAC 29, Rabat 10000, Morocco
关键词
Denial of Service (DoS); Distributed DoS; NS-3; Simulation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper focuses on optimizing the sigmoid filter for detecting Low-Rate DoS attacks. Though sigmoid filter could help for detecting the attacker, it could severely affect the network efficiency. Unlike high rate attacks, Low-Rate DoS attacks such as "Shrew" and "New Shrew" are hard to detect. Attackers choose a malicious low-rate bandwidth to exploit the TCP's congestion control window algorithm and the re-transition time-out mechanism. We simulated the attacker traffic by editing using NS3. The Sigmoid filter was used to create a threshold bandwidth filter at the router that allowed a specific bandwidth, so when traffic that exceeded the threshold occurred, it would be dropped, or it would be redirected to a honey-pot server, instead. We simulated the Sigmoid filter using MATLAB and took the attacker's and legitimate user's traffic generated by NS3 as the input for the Sigmoid filter in the MATLAB. We run the experiment three times with different threshold values correlated to the TCP packet size. We found the probability to detect the attacker traffic as follows: the first was 25%, the second 50% and the third 60%. However, we observed a drop in legitimate user traffic with the following probabilities, respectively: 75%, 50%, and 85%.
引用
收藏
页码:450 / 456
页数:7
相关论文
共 50 条
  • [31] SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters
    Shaurya Sood
    Neminath Hubballi
    The Journal of Supercomputing, 2024, 80 : 1788 - 1817
  • [32] A Router-based Technique to Detect and Defend against Low-rate Denial of Service
    Zhu Lina
    Zhu Dongzhao
    2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 257 - 260
  • [33] Detecting Denial-of-Service Attacks Using sFlow
    Hublikar, Shivaraj
    Eligar, Vijaya
    Kakhandki, Arun
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 483 - 491
  • [34] Detecting and Reacting against Distributed Denial of Service Attacks
    Bouzida, Yacine
    Cuppens, Frederic
    Gombault, Sylvain
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2394 - 2399
  • [35] The LoSS technique for detecting new denial of service attacks
    Allen, WH
    Marin, GA
    PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: ENGINEERING CONNECTS, 2004, : 302 - 309
  • [36] Computational intelligent techniques for detecting denial of service attacks
    Mukkamala, S
    Sung, AH
    INNOVATIONS IN APPLIED ARTIFICIAL INTELLIGENCE, 2004, 3029 : 616 - 624
  • [37] Detecting Low-Rate Replay-Based Injection Attacks on In-Vehicle Networks
    Katragadda, Satya
    Darby, Paul J., III
    Roche, Andrew
    Gottumukkala, Raju
    IEEE ACCESS, 2020, 8 : 54979 - 54993
  • [38] An efficient filter for denial-of-service bandwidth attacks
    Abdelsayed, S
    Glimsholt, D
    Leckie, C
    Ryan, S
    Shami, S
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1353 - 1357
  • [39] Modeling of Low-Rate DDoS-Attacks
    Tarasov, Yaroslav
    Pakulova, Ekaterina
    Basov, Oleg
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [40] Lightweight, Low-Rate Denial-of-Service Attack Prevention and Control Program for IoT Devices
    Wu, Chi-Che
    Cheng, Rung-Shiang
    Hsu, Chiung-Wen
    Wu, Li-Wei
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (03): : 877 - 885