Analysing the Influence of the DCBF data Structure on the DoS Attack Detection

被引:0
|
作者
Dodig, Ivica [1 ]
Cafuta, Davor [1 ]
Sruk, Vlado [2 ]
机构
[1] Univ Appl Sci, Zagreb, Croatia
[2] Univ Zagreb, Fac Elect Engn & Comp, Unska 3, Zagreb, Croatia
关键词
DoS; Bloom filter; DCBF; False positive error; NETWORK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most common threats to internet security isthe Denial of Service attack. There are numerous methods and protocol changes in an effort to detect them. The most common DoS attack detection method relies on the number of the TCP control packet in the network flow. The Bloom filter represents a spaceefficient data structure that is commonly utilized to detect matching pairs. There are multiple algorithms for the DoS attack detection based on the Bloom filter. The SACK(2) algorithm uses the SYN/ACK - ACK matching pair detection with the Bloom filter data structure. The false positive error introduced by the Bloom filter influences on the matching pair detection in the algorithm. The improved SACK(2) algorithm significantly reduces the false positive error by replacing the Counting Bloom Filter (CBF) data structure with the Dual Counting Bloom Filter (DCBF) data structure. This improvement significantly improves the matching pair detection. It is expected that the false positive error should influence on the detection of the DoS attack. In this paper, the experimental study is performed to analyse this influence. This study confirms the correlation between the false positive error and the DoS attack detection.
引用
收藏
页码:791 / 797
页数:7
相关论文
共 50 条
  • [31] Request Response Detection Algorithm for Detecting DoS Attack in VANET
    Gandhi, Usha Devi
    Keerthana, R. V. S. M.
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 192 - 194
  • [32] Detection DoS Attack on FPGA Using Fuzzy Association Rules
    Tuncer, Taner
    Tatar, Yetkin
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 1271 - 1276
  • [33] DoS and Port Scan attack Detection in High Speed Networks
    Hasanifard, Masoud
    Ladani, Behrouz Tork
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 61 - 66
  • [34] A Distributed Self-Organizing Map for DoS Attack Detection
    Kim, Minhoe
    Jung, Souhwan
    Park, Minho
    2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 19 - 22
  • [35] DoS Attack Detection using a two dimensional Wavelet Transform
    de Azevedo, Renato Preigschadt
    Mozzaquatro, Bruno
    Kozakevicius, Alice
    Nunes, Raul Ceretta
    Cappo, Cristian
    Schaerer, Christian
    2012 XXXVIII CONFERENCIA LATINOAMERICANA EN INFORMATICA (CLEI), 2012,
  • [36] An ontology approach for proactive detection of HTTP flood DoS attack
    Deepak Kshirsagar
    Sandeep Kumar
    International Journal of System Assurance Engineering and Management, 2023, 14 : 840 - 847
  • [37] DoS and DDoS Attack Detection Using Deep Learning and IDS
    Shurman, Mohammad
    Khrais, Rami
    Yateem, Abdulrahman
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (4A) : 655 - 661
  • [38] Detection of DoS attack Time interval Sequences on Network Traffic
    Reshamwala, Alpa
    Mahajan, Sunita
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 739 - 744
  • [39] DoS Attack Detection Based on Deep Factorization Machine in SDN
    Wang J.
    Lei X.
    Jiang Q.
    Alfarraj O.
    Tolba A.
    Kim G.-J.
    Computer Systems Science and Engineering, 2023, 45 (02): : 1727 - 1742
  • [40] A DoS attack detection method based on adversarial neural network
    Li, Yang
    Wu, Haiyan
    PEERJ COMPUTER SCIENCE, 2024, 10