Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey

被引:54
|
作者
Wu Zhijun [1 ]
Li Wenjing [1 ]
Liu Liang [1 ]
Yue Meng [1 ]
机构
[1] Civil Aviat Univ China, Coll Elect Informat & Automat, Tianjin 300300, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Computer crime; Cloud computing; Big Data; Floods; Telecommunication traffic; Servers; Licenses; Low-rate Denial of Service attacks (LDoS); detection method; attack prevention system; defense mechanism; SOFTWARE-DEFINED NETWORKING;
D O I
10.1109/ACCESS.2020.2976609
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Low-rate Denial of service (LDoS) attacks has become one of the biggest threats to the Internet, cloud computing platforms, and big data centers. As an evolutionary species of DDoS attack, LDoS attack is essentially different from the DDoS attack. DDoS attacks are the behavior of malicious blocking legitimate network traffic by destroying the targets and the infrastructure around it with huge network traffic. While, LDoS attacks are the behavior of intentional degrading the quality of TCP links by throttling TCP flows to a small fraction of its ideal rate with periodic small pulse sequence. Hence, LDoS attack has a very small flow (around 10 & x0025;& x2013;20 & x0025; of the background traffic), it is easy to eluding the detection of routers and counter-DoS mechanisms. We try to reveal the mechanism of the LDoS attack and attempt to figure out the generation principle of LDoS attack in this paper. We classify the LDoS attacks and existing defense methods according to time domain and frequency domain in which detection and defense are performed. Furthermore, we highlight the filter approach to defense against LDoS attack. The initial purpose of our work is to encourage researchers to study effective ways to detect and defend against LDoS attacks with innovation and aggressiveness.
引用
收藏
页码:43920 / 43943
页数:24
相关论文
共 50 条
  • [1] Survey on Low-Rate DDoS Attacks, Detection and Defense
    Drinic, Dusan
    Cica, Zoran
    [J]. 2024 23RD INTERNATIONAL SYMPOSIUM INFOTEH-JAHORINA, INFOTEH, 2024,
  • [2] Coherent Detection of Synchronous Low-Rate DoS Attacks
    Wu, Zhijun
    Yin, Yue
    Li, Guang
    Yue, Meng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [3] Defense techniques for low-rate DoS attacks against application servers
    Macia-Fernandez, Gabriel
    Rodriguez-Gomez, Rafael A.
    Diaz-Verdejo, Jesus E.
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2711 - 2727
  • [4] The detection of low-rate DoS attacks using the SADBSCAN algorithm
    Tang, Dan
    Zhang, Siqi
    Chen, Jingwen
    Wang, Xiyin
    [J]. INFORMATION SCIENCES, 2021, 565 : 229 - 247
  • [5] SEDP-based detection of low-rate DoS attacks
    Wu, Zhijun
    Yue, Meng
    Li, Douzhe
    Xie, Ke
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (11) : 1772 - 1788
  • [6] Low-Rate DoS Attacks Detection Based on Network Multifractal
    Wu, Zhijun
    Zhang, Liyuan
    Yue, Meng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 559 - 567
  • [7] A comparative study on flood DoS and low-rate DoS attacks
    Liu, Xiao-Ming
    Cheng, Gong
    Li, Qi
    Zhang, Miao
    [J]. Journal of China Universities of Posts and Telecommunications, 2012, 19 (SUPPL. 1): : 116 - 121
  • [8] Low-Rate DoS Attacks Detection Based on MAF-ADM
    Zhan, Sijia
    Tang, Dan
    Man, Jianping
    Dai, Rui
    Wang, Xiyin
    [J]. SENSORS, 2020, 20 (01)
  • [9] An On-Line Intrusion Detection Approach to Identify Low-Rate DoS Attacks
    Aiello, M.
    Cambiaso, E.
    Mongelli, M.
    Papaleo, G.
    [J]. 2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [10] Power spectrum entropy based detection and mitigation of low-rate DoS attacks
    Chen, Zhaomin
    Yeo, Chai Kiat
    Lee, Bu Sung
    Lau, Chiew Tong
    [J]. COMPUTER NETWORKS, 2018, 136 : 80 - 94