Analysing the Influence of the DCBF data Structure on the DoS Attack Detection

被引:0
|
作者
Dodig, Ivica [1 ]
Cafuta, Davor [1 ]
Sruk, Vlado [2 ]
机构
[1] Univ Appl Sci, Zagreb, Croatia
[2] Univ Zagreb, Fac Elect Engn & Comp, Unska 3, Zagreb, Croatia
关键词
DoS; Bloom filter; DCBF; False positive error; NETWORK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most common threats to internet security isthe Denial of Service attack. There are numerous methods and protocol changes in an effort to detect them. The most common DoS attack detection method relies on the number of the TCP control packet in the network flow. The Bloom filter represents a spaceefficient data structure that is commonly utilized to detect matching pairs. There are multiple algorithms for the DoS attack detection based on the Bloom filter. The SACK(2) algorithm uses the SYN/ACK - ACK matching pair detection with the Bloom filter data structure. The false positive error introduced by the Bloom filter influences on the matching pair detection in the algorithm. The improved SACK(2) algorithm significantly reduces the false positive error by replacing the Counting Bloom Filter (CBF) data structure with the Dual Counting Bloom Filter (DCBF) data structure. This improvement significantly improves the matching pair detection. It is expected that the false positive error should influence on the detection of the DoS attack. In this paper, the experimental study is performed to analyse this influence. This study confirms the correlation between the false positive error and the DoS attack detection.
引用
收藏
页码:791 / 797
页数:7
相关论文
共 50 条
  • [1] A Proposed DoS Detection Scheme for Mitigating DoS Attack Using Data Mining Techniques
    Djanie, Kotey Seth
    Tutu, Tchao Eric
    Dzisi, Gadze James
    COMPUTERS, 2019, 8 (04)
  • [2] Research on DoS Attack and Detection Programming
    Liu, Wentao
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 1, PROCEEDINGS, 2009, : 207 - 210
  • [3] DoS Attack Detection in VANET using Transfer Learning Approach for BSM Data
    Shahid, Muhammad Anwar
    Jaekel, Arunita
    Zhang, Ning
    Allsopp, Tim
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 748 - 753
  • [4] A Data Mining Based Approach towards Detection of Low Rate DoS Attack
    Sharma, Mohit
    Unde, Nimish
    Borude, Ketan
    Paradkar, Amol
    2014 INTERNATIONAL CONFERENCE FOR CONVERGENCE OF TECHNOLOGY (I2CT), 2014,
  • [5] Trust Based DoS Attack Detection in Wireless Sensor Networks for Reliable Data Transmission
    Anand, C.
    Vasuki, N.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 121 (04) : 2911 - 2926
  • [6] Trust Based DoS Attack Detection in Wireless Sensor Networks for Reliable Data Transmission
    C. Anand
    N. Vasuki
    Wireless Personal Communications, 2021, 121 : 2911 - 2926
  • [7] Anomaly detection for DOS routing attack by a attack source location method
    HeLiu, A.
    Zhao, B. Yingjun
    Dong, C. Qingkuan
    2016 IEEE CHINESE GUIDANCE, NAVIGATION AND CONTROL CONFERENCE (CGNCC), 2016, : 25 - 29
  • [8] An efficient feature reduction method for the detection of DoS attack
    Kshirsagar, Deepak
    Kumar, Sandeep
    ICT EXPRESS, 2021, 7 (03): : 371 - 375
  • [9] Detection of DoS attack and Zero Day Threat with SIEM
    Sornalakshmi, K.
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 1 - 7
  • [10] An Effective Performance For Denial Of Service Attack (DoS) Detection
    Hemalatha, P.
    Vijithaananthi, J.
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 229 - 233