A protocol-free detection against cloud oriented reflection DoS attacks

被引:0
|
作者
Le Xiao
Wei Wei
Weidong Yang
Yulong Shen
Xianglin Wu
机构
[1] Huazhong University of Science and Technology,School of Automation
[2] Henan University of Technology,College of Information Science and Engineering
[3] Xidian University,School of Computer Science and Technology
来源
Soft Computing | 2017年 / 21卷
关键词
Cloud computing; Reflection DoS; Flash crowds; Flow correlation coefficient; Protocol-free detection; Botnets;
D O I
暂无
中图分类号
学科分类号
摘要
Distributed denial of service (DDoS) attack presents a critical threat to cloud infrastructure, where many manipulated hosts flood the victim cloud with plenty of packets, which will lead to the exhaustion of bandwidth and other system resources. As one type of DDoS attack, in reflection DoS (RDoS) attack, legitimate servers (reflectors) are fooled into sending a large number of packets to the victim cloud. Most of the existed RDoS attack detection mechanisms are protocol-specific, thus low in efficiency. It is inspected that because of being triggered by the same attacking flow, intra-unite correlation exists among the packet rate of attacking flows. Based on the phenomenon, a flow correlation coefficient (FCC)-based protocol-free detection (PFD) algorithm is proposed. The simulation results show that PFD can detect attacking flows efficiently and effectively and is not protocol-specific, thus can be used as effective supplement to existed algorithms.
引用
收藏
页码:3713 / 3721
页数:8
相关论文
共 50 条
  • [41] Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in Cloud
    Narwal, Priti
    Kumar, Deepak
    Singh, Shailendra Narayan
    Tewari, Peeyush
    JOURNAL OF INFORMATION TECHNOLOGY RESEARCH, 2021, 14 (04) : 45 - 57
  • [42] An improved free-roaming mobile agent security protocol against colluded truncation attacks
    Xu, Darren
    Harn, Lein
    Narasimhan, Mayur
    Luo, Junzhou
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 309 - +
  • [43] A Novel Free-Roaming Mobile Agent Security Protocol Against Colluded Truncation Attacks
    Lei, Silei
    Liu, Jun
    Deng, Chuan
    Xiao, Junmo
    2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 348 - 353
  • [44] Protocol specific Multi-threaded Network Intrusion Detection System (PM-NIDS) for DoS/DDoS Attack Detection in Cloud
    Patil, Rajendra
    Dudeja, Harsha
    Gawade, Snehal
    Modi, Chirag
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [45] Practical Implementation of an Adaptive Detection-Defense Unit against Link Layer DoS Attacks for Wireless Sensor Networks
    Dener, Murat
    Bay, Omer Faruk
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [46] Resilient Event-Based Fuzzy Fault Detection for DC Microgrids in Finite-Frequency Domain against DoS Attacks
    Ma, Bowen
    Lu, Qing
    Gu, Zhou
    SENSORS, 2024, 24 (09)
  • [47] Detection and reconstruction of measurements against false data injection and DoS attacks in distribution system state estimation: A deep learning approach
    Raghuvamsi, Y.
    Teeparthi, Kiran
    MEASUREMENT, 2023, 210
  • [48] Statistically Validating Intrusion Detection Framework Against Selected DoS Attacks in Ad Hoc Networks: An NS-2 Simulation Study
    Lokhande, Sakharam
    Bhalchandra, Parag
    Khamitkar, Santosh
    Deshmukh, Nilesh
    Mekewad, Satish
    Wasnik, Pawan
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 1, CIDM 2015, 2016, 410 : 411 - 420
  • [49] Reset observer-based containment protocol via event-triggered strategy for multi-agent networks against aperiodic DoS attacks
    Zhao, Dawei
    Xiang, Wenkang
    Song, Weizhao
    Xu, Lijuan
    Chen, Chuan
    Wang, Zhen
    APPLIED MATHEMATICS AND COMPUTATION, 2025, 500
  • [50] Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection
    Lu, Chun-Shien
    Sun, Shih-Wei
    Hsu, Chao-Yong
    Chang, Pao-Chi
    IEEE TRANSACTIONS ON MULTIMEDIA, 2006, 8 (04) : 668 - 685