Applying Sigmoid Filter for Detecting the Low-Rate Denial of Service Attacks

被引:0
|
作者
Rabie, Rashed [1 ]
Drissi, Maroua [2 ]
机构
[1] Univ Dist Columbia, Sch Engn & Appl Sci, Elect & Comp Engn Dept, Washington, DC 20008 USA
[2] Mohammed V Univ, Fac Sci, LRIT Assoc Unit CNRST, URAC 29, Rabat 10000, Morocco
关键词
Denial of Service (DoS); Distributed DoS; NS-3; Simulation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper focuses on optimizing the sigmoid filter for detecting Low-Rate DoS attacks. Though sigmoid filter could help for detecting the attacker, it could severely affect the network efficiency. Unlike high rate attacks, Low-Rate DoS attacks such as "Shrew" and "New Shrew" are hard to detect. Attackers choose a malicious low-rate bandwidth to exploit the TCP's congestion control window algorithm and the re-transition time-out mechanism. We simulated the attacker traffic by editing using NS3. The Sigmoid filter was used to create a threshold bandwidth filter at the router that allowed a specific bandwidth, so when traffic that exceeded the threshold occurred, it would be dropped, or it would be redirected to a honey-pot server, instead. We simulated the Sigmoid filter using MATLAB and took the attacker's and legitimate user's traffic generated by NS3 as the input for the Sigmoid filter in the MATLAB. We run the experiment three times with different threshold values correlated to the TCP packet size. We found the probability to detect the attacker traffic as follows: the first was 25%, the second 50% and the third 60%. However, we observed a drop in legitimate user traffic with the following probabilities, respectively: 75%, 50%, and 85%.
引用
收藏
页码:450 / 456
页数:7
相关论文
共 50 条
  • [41] The Low-rate Denial of Service Attack Based Comparative Study of Active Queue Management Scheme
    Patel, Sanjeev
    Sharma, Abhinav
    2017 TENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2017, : 393 - 395
  • [42] Lightweight, Low-Rate Denial-of-Service Attack Prevention and Control Program for IoT Devices
    Wu, Chi-Che
    Wang, Wei Yang
    Cheng, Rung-Shiang
    IOT AS A SERVICE, IOTAAS 2017, 2018, 246 : 243 - 247
  • [43] Low-rate Denial of Service attack detection method based on time-frequency characteristics
    Fu, Yu
    Duan, Xueyuan
    Wang, Kun
    Li, Bin
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):
  • [44] Low-rate Denial of Service attack detection method based on time-frequency characteristics
    Yu Fu
    Xueyuan Duan
    Kun Wang
    Bin Li
    Journal of Cloud Computing, 11
  • [45] Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features
    Kang, Jian
    Yang, Mei
    Zhang, Junyao
    JOURNAL OF SENSORS, 2015, 2015
  • [46] Detecting distributed denial of service attacks by sharing distributed beliefs
    Peng, T
    Leckie, C
    Ramamohanarao, K
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 214 - 225
  • [47] Detecting denial-of-service attacks with incomplete audit data
    Patcha, A
    Park, JM
    ICCCN 2005: 14th International Conference on Computer Communications and Networks, Proceedings, 2005, : 263 - 268
  • [48] Detecting dsitributed denial of service attacks with discrete wavelet transform
    Ren, JA
    Li, JP
    Chen, F
    Wavelet Analysis and Active Media Technology Vols 1-3, 2005, : 1412 - 1418
  • [49] Detecting Denial of Service attacks using machine learning algorithms
    Kumari, Kimmi
    Mrunalini, M.
    JOURNAL OF BIG DATA, 2022, 9 (01)
  • [50] Detecting Denial-of-Service attacks using the wavelet transform
    Hamdi, Mohamed
    Boudriga, Noureddine
    COMPUTER COMMUNICATIONS, 2007, 30 (16) : 3203 - 3213