Adaptive Response System for Distributed Denial-of-Service Attacks

被引:5
|
作者
Thing, Vrizlynn L. L.
Sloman, Morris
Dulay, Naranker
机构
关键词
Distributed Denial of Service; Adaptive Response System;
D O I
10.1109/INM.2009.5188887
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This dissertation presents a Distributed denial-of-service Adaptive ResponsE (DARE) system, capable of executing appropriate detection and mitigation responses automatically and adaptively according to the attacks. It supports easy integration of distributed modules for both signature-based and anomaly-based detection. Additionally, the innovative design of DARE's individual components takes into consideration the strengths and weaknesses of existing defence mechanisms, and the characteristics and possible future mutations of DDoS attacks. The distributed components work together interactively to adapt detection and response according to the attack types. Experiments on DARE show that the attack detection and mitigation were successfully completed within seconds, with about 60% to 86% of the attack traffic being dropped, while availability for legitimate and new legitimate requests was maintained. DARE is able to detect and trigger appropriate responses in accordance to the attacks being launched with high accuracy, effectiveness and efficiency. The dissertation is available at http://pubs.doc.ic.ac.ukNrizlynnThing-PhD-Thesis-2008/VrizlynnThing-PhD-Thesis-2008.pdf.
引用
下载
收藏
页码:809 / 814
页数:6
相关论文
共 50 条
  • [21] Analysis of the effects of distributed denial-of-service attacks on MPLS networks
    Genge, Bela
    Siaterlis, Christos
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2013, 6 (02) : 87 - 95
  • [22] Distributed denial-of-service attacks against HTTP/2 services
    Adi, Erwin
    Baig, Zubair A.
    Hingston, Philip
    Lam, Chiou-Peng
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 79 - 86
  • [23] Distributed denial-of-service attacks against HTTP/2 services
    Erwin Adi
    Zubair A. Baig
    Philip Hingston
    Chiou-Peng Lam
    Cluster Computing, 2016, 19 : 79 - 86
  • [24] Adaptive client puzzle scheme against denial-of-service attacks
    Chen, Rui-Chuan
    Guo, Wen-Jia
    Tang, Li-Yong
    Chen, Zhong
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (09): : 2558 - 2573
  • [25] Adaptive Formation for Multiagent Systems Subject to Denial-of-Service Attacks
    Pan, Kunpeng
    Lyu, Yang
    Pan, Quan
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022, 69 (08) : 3391 - 3401
  • [26] Coping with Denial-of-Service Attacks on the IP Telephony System
    Cadet, Frantz
    Fokum, Daniel T.
    SOUTHEASTCON 2016, 2016,
  • [27] Investigation of Simple Denial-of-Service Attacks
    Voitovych, Olesya
    Baryshev, Yurii
    Kolibabchuk, Eduard
    Kupershtein, Leonid
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 145 - 148
  • [28] Distributed Localization in Wireless Sensor Networks Under Denial-of-Service Attacks
    Shi, Lei
    Liu, Qingchen
    Shao, Jinliang
    Cheng, Yuhua
    IEEE CONTROL SYSTEMS LETTERS, 2021, 5 (02): : 493 - 498
  • [29] Distributed Resilient Filtering for Power Systems Subject to Denial-of-Service Attacks
    Chen, Wei
    Ding, Derui
    Dong, Hongli
    Wei, Guoliang
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2019, 49 (08): : 1688 - 1697
  • [30] Requirements for a general framework for response to distributed denial-of-service
    Gresty, DW
    Shi, Q
    Merabti, M
    17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 422 - 429