A protocol-free detection against cloud oriented reflection DoS attacks

被引:0
|
作者
Le Xiao
Wei Wei
Weidong Yang
Yulong Shen
Xianglin Wu
机构
[1] Huazhong University of Science and Technology,School of Automation
[2] Henan University of Technology,College of Information Science and Engineering
[3] Xidian University,School of Computer Science and Technology
来源
Soft Computing | 2017年 / 21卷
关键词
Cloud computing; Reflection DoS; Flash crowds; Flow correlation coefficient; Protocol-free detection; Botnets;
D O I
暂无
中图分类号
学科分类号
摘要
Distributed denial of service (DDoS) attack presents a critical threat to cloud infrastructure, where many manipulated hosts flood the victim cloud with plenty of packets, which will lead to the exhaustion of bandwidth and other system resources. As one type of DDoS attack, in reflection DoS (RDoS) attack, legitimate servers (reflectors) are fooled into sending a large number of packets to the victim cloud. Most of the existed RDoS attack detection mechanisms are protocol-specific, thus low in efficiency. It is inspected that because of being triggered by the same attacking flow, intra-unite correlation exists among the packet rate of attacking flows. Based on the phenomenon, a flow correlation coefficient (FCC)-based protocol-free detection (PFD) algorithm is proposed. The simulation results show that PFD can detect attacking flows efficiently and effectively and is not protocol-specific, thus can be used as effective supplement to existed algorithms.
引用
收藏
页码:3713 / 3721
页数:8
相关论文
共 50 条
  • [21] Detection and Mitigation of DoS Attacks in VANET Using Secured Minimum Delay Routing Protocol
    Duduku, V. Viswacheda
    Chekima, Ali
    Dargham, Jamal Ahmad
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 472 - 479
  • [22] MlPv6 binding update protocol secure against both redirect and DoS attacks
    Kang, HS
    Park, CS
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 407 - 418
  • [23] Detection of New Attacks on Ubiquitous Services in Cloud Computing and Against Measure
    Sellami, Lynda
    Idoughi, Djilali
    Tiako, Pierre F.
    ADVANCED SCIENCE LETTERS, 2016, 22 (10) : 3168 - 3172
  • [24] A Study on the Impact of Memory DoS Attacks on Cloud Applications and Exploring Real-Time Detection Schemes
    Li, Zhuozhao
    Sen, Tanmoy
    Shen, Haiying
    Chuah, Mooi Choo
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (04) : 1644 - 1658
  • [25] Securing Cloud Infrastructure Against Co-Resident DoS Attacks Using Game Theoretic Defense Mechanisms
    Bedi, Harkeerat Singh
    Shiva, Sajjan
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 463 - 469
  • [26] Distributed Resilient Initialization-Free Jacobi Descent Algorithm for Constrained Optimization Against DoS Attacks
    Li, Yushuai
    Huang, Bonan
    Dai, Jing
    Gao, David Wenzhong
    Sun, Qiuye
    Zhang, Huaguang
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, 21 (03) : 3332 - 3343
  • [27] A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment
    Gupta, Sanchika
    Horrow, Susmita
    Sardana, Anjali
    CONTEMPORARY COMPUTING, 2012, 306 : 498 - 499
  • [28] Game-Theory based Detection and Prevention of DoS Attacks on Networking Node in Open Stack Private Cloud
    Narwal, Priti
    Singh, Shailendra N.
    Kumar, Deepak
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 481 - 486
  • [29] Building a Private Cloud Computing and The Analysis against DoS (Denial of Service) attacks Case Study at SMKN 6 Jakarta
    Bahaweres, Rizal Broer
    Sharif, Johan
    Alaydrus, Mudrik
    2016 4TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT, 2016, : 233 - 238
  • [30] RED-FT: A Scalable Random Early Detection Scheme with Flow Trust against DoS Attacks
    Jiang, Xianliang
    Yang, Jiangang
    Jin, Guang
    Wei, Wei
    IEEE COMMUNICATIONS LETTERS, 2013, 17 (05) : 1032 - 1035