Modeling and Simulation of Low Rate of Denial of Service Attacks

被引:1
|
作者
Xia, Kuiliang [1 ]
机构
[1] Heihe Univ, Heihe 164300, Heilongjiang, Peoples R China
关键词
Low-Rate Denial of Service Attacks; Congestion Control; Attack Prevention; Network Security;
D O I
10.4028/www.scientific.net/AMM.484-485.1063
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference.
引用
收藏
页码:1063 / 1066
页数:4
相关论文
共 50 条
  • [41] Politically Motivated Denial of Service Attacks
    Nazario, Jose
    THE VIRTUAL BATTLEFIELD: PERSPECTIVES ON CYBER WARFARE, 2009, 3 : 163 - 181
  • [42] Detecting Denial of Service Attacks in the Cloud
    Kumar, Raneel
    Lal, Sunil Pranit
    Sharma, Alok
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 309 - 316
  • [43] Denial-of-Service Attacks to UMTS
    Bertino, Elisa
    COMPUTER, 2015, 48 (02) : 6 - 6
  • [44] Detecting Denial of Service Attacks in Tor
    Danner, Norman
    Krizanc, Danny
    Liberatore, Marc
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 273 - 284
  • [45] VULNERABILITY OF INSENS TO DENIAL OF SERVICE ATTACKS
    Saghar, Kashif
    Kendall, David
    Bouridane, Ahmed
    2011 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2011, : 1896 - 1899
  • [46] Denial of Service Attacks Mitigation in the Cloud
    Alosaimi, Wael
    Zak, Michal
    Al-Begain, Khalid
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 47 - 53
  • [47] A SURVEY ON DENIAL OF SERVICE ATTACKS AND PRECLUSIONS
    Nagesh, K.
    Sumathy, R.
    Devakumar, P.
    Sathiyamurthy, K.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [48] Analysis of denial-of-service attacks on denial-of-service defensive measures
    Wang, BT
    Schulzrinne, H
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1339 - 1343
  • [49] Detection of Denial-of-service Attacks
    Anh Quang Tran
    计算机工程, 2002, (S1) : 86 - 91
  • [50] Honeypots for distributed Denial of Service Attacks
    Weiler, N
    WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 109 - 114