首页 > 最新文献

Research Anthology on Combating Denial-of-Service Attacks最新文献

英文 中文
Detection of Botnet Based Attacks on Network 基于僵尸网络的网络攻击检测
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5348-0.ch004
Prachi
This chapter describes how with Botnets becoming more and more the leading cyber threat on the web nowadays, they also serve as the key platform for carrying out large-scale distributed attacks. Although a substantial amount of research in the fields of botnet detection and analysis, bot-masters inculcate new techniques to make them more sophisticated, destructive and hard to detect with the help of code encryption and obfuscation. This chapter proposes a new model to detect botnet behavior on the basis of traffic analysis and machine learning techniques. Traffic analysis behavior does not depend upon payload analysis so the proposed technique is immune to code encryption and other evasion techniques generally used by bot-masters. This chapter analyzes the benchmark datasets as well as real-time generated traffic to determine the feasibility of botnet detection using traffic flow analysis. Experimental results clearly indicate that a proposed model is able to classify the network traffic as a botnet or as normal traffic with a high accuracy and low false-positive rates.
本章描述了随着僵尸网络越来越成为当今网络上的主要网络威胁,它们也是实施大规模分布式攻击的关键平台。尽管在僵尸网络检测和分析领域进行了大量的研究,但机器人大师们不断灌输新技术,使它们更加复杂,破坏性更强,并且在代码加密和混淆的帮助下难以被发现。本章提出了一种基于流量分析和机器学习技术的僵尸网络行为检测新模型。流量分析行为不依赖于负载分析,因此所提出的技术不受代码加密和其他bot-master通常使用的逃避技术的影响。本章分析了基准数据集以及实时生成的流量,以确定利用流量分析进行僵尸网络检测的可行性。实验结果清楚地表明,该模型能够以较高的准确率和较低的误报率将网络流量分类为僵尸网络或正常流量。
{"title":"Detection of Botnet Based Attacks on Network","authors":"Prachi","doi":"10.4018/978-1-7998-5348-0.ch004","DOIUrl":"https://doi.org/10.4018/978-1-7998-5348-0.ch004","url":null,"abstract":"This chapter describes how with Botnets becoming more and more the leading cyber threat on the web nowadays, they also serve as the key platform for carrying out large-scale distributed attacks. Although a substantial amount of research in the fields of botnet detection and analysis, bot-masters inculcate new techniques to make them more sophisticated, destructive and hard to detect with the help of code encryption and obfuscation. This chapter proposes a new model to detect botnet behavior on the basis of traffic analysis and machine learning techniques. Traffic analysis behavior does not depend upon payload analysis so the proposed technique is immune to code encryption and other evasion techniques generally used by bot-masters. This chapter analyzes the benchmark datasets as well as real-time generated traffic to determine the feasibility of botnet detection using traffic flow analysis. Experimental results clearly indicate that a proposed model is able to classify the network traffic as a botnet or as normal traffic with a high accuracy and low false-positive rates.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115845302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Denial of Service Attacks and Preclusions 拒绝服务攻击及其排除研究综述
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5348-0.ch012
Nagesh K., Sumathy R., Devakumar P., Sathiyamurthy K.
Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world. These attacks attempt to disrupt legitimate user's access to services. By exploiting computer's vulnerabilities, attackers easily consume victim's resources. Many special techniques have been developed to protest against DOS attacks. Some organizations constitute several defense mechanism tools to tackle the security problems. This paper has proposed various types of attacks and solutions associated with each layers of OSI model. These attacks and solutions have different impacts on the different environment. Thus the rapid growth of new technologies may constitute still worse impacts of attacks in the future.
安全与保护资产有关。安全的各个方面可以应用于任何情况——防御、侦查和威慑。网络安全对保护计算机网络上的信息、硬件和软件起着重要作用。拒绝服务(DOS)攻击对网络世界造成了巨大的影响。这些攻击试图破坏合法用户对服务的访问。通过利用计算机的漏洞,攻击者很容易消耗受害者的资源。已经开发了许多特殊的技术来抵制DOS攻击。一些组织构建了几个防御机制工具来解决安全问题。本文针对OSI模型的各个层提出了不同类型的攻击和解决方案。这些攻击和解决方案对不同的环境有不同的影响。因此,新技术的快速发展可能会在未来构成更严重的攻击影响。
{"title":"A Survey on Denial of Service Attacks and Preclusions","authors":"Nagesh K., Sumathy R., Devakumar P., Sathiyamurthy K.","doi":"10.4018/978-1-7998-5348-0.ch012","DOIUrl":"https://doi.org/10.4018/978-1-7998-5348-0.ch012","url":null,"abstract":"Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world. These attacks attempt to disrupt legitimate user's access to services. By exploiting computer's vulnerabilities, attackers easily consume victim's resources. Many special techniques have been developed to protest against DOS attacks. Some organizations constitute several defense mechanism tools to tackle the security problems. This paper has proposed various types of attacks and solutions associated with each layers of OSI model. These attacks and solutions have different impacts on the different environment. Thus the rapid growth of new technologies may constitute still worse impacts of attacks in the future.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114907763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Detailed Study on Security Concerns of VANET and Cognitive Radio VANETs VANET与认知无线电VANET安全问题的详细研究
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7522-1.CH013
M. Manikandakumar, Sri Subarnaa D. K., Monica Grace R.
Wireless ad hoc networks are dynamic networks in which nodes can move freely in the network. A new type of Vehicular Ad Hoc Network (VANET) that allows smart transport system to provide road security and reduces traffic jams through automobile-to-automobile and automobile-to-roadside communication. In this, vehicles rely on the integrity of received data for deciding when to present alerts to drivers. Because of wireless network the VANET messages are vulnerable to many attacks and the security concerns are also major issues. So, with respect to these methods, this article will discuss the Denial of Service (DoS) attack, masquerading, and their vulnerabilities. Also, it classifies the securities and their prevention mechanisms in overcoming these security issues in VANET and Cognitive Radio VANET perspectives.
无线自组织网络是节点可以在网络中自由移动的动态网络。一种新型的车辆自组织网络(VANET),允许智能交通系统通过车对车和车对路边的通信提供道路安全并减少交通拥堵。在这种情况下,车辆依赖于接收到的数据的完整性来决定何时向驾驶员发出警报。由于无线网络的特点,VANET信息容易受到多种攻击,安全问题也是主要问题。因此,对于这些方法,本文将讨论拒绝服务(DoS)攻击、伪装及其漏洞。并从VANET和认知无线电VANET的角度对安全问题进行了分类,分析了安全问题的防范机制。
{"title":"A Detailed Study on Security Concerns of VANET and Cognitive Radio VANETs","authors":"M. Manikandakumar, Sri Subarnaa D. K., Monica Grace R.","doi":"10.4018/978-1-5225-7522-1.CH013","DOIUrl":"https://doi.org/10.4018/978-1-5225-7522-1.CH013","url":null,"abstract":"Wireless ad hoc networks are dynamic networks in which nodes can move freely in the network. A new type of Vehicular Ad Hoc Network (VANET) that allows smart transport system to provide road security and reduces traffic jams through automobile-to-automobile and automobile-to-roadside communication. In this, vehicles rely on the integrity of received data for deciding when to present alerts to drivers. Because of wireless network the VANET messages are vulnerable to many attacks and the security concerns are also major issues. So, with respect to these methods, this article will discuss the Denial of Service (DoS) attack, masquerading, and their vulnerabilities. Also, it classifies the securities and their prevention mechanisms in overcoming these security issues in VANET and Cognitive Radio VANET perspectives.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122276401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visualization Technique for Intrusion Detection 入侵检测可视化技术
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5583-4.CH011
M. Cheikh, S. Hacini, Z. Boufaida
Intrusion detection system (IDS) plays a vital and crucial role in a computer security. However, they suffer from a number of problems such as low detection of DoS (denial-of-service)/DDoS (distributed denial-of-service) attacks with a high rate of false alarms. In this chapter, a new technique for detecting DoS attacks is proposed; it detects DOS attacks using a set of classifiers and visualizes them in real time. This technique is based on the collection of network parameter values (data packets), which are automatically represented by simple geometric graphs in order to highlight relevant elements. Two implementations for this technique are performed. The first is based on the Euclidian distance while the second is based on KNN algorithm. The effectiveness of the proposed technique has been proven through a simulation of network traffic drawn from the 10% KDD and a comparison with other classification techniques for intrusion detection.
入侵检测系统在计算机安全中起着至关重要的作用。然而,它们面临着许多问题,例如DoS(拒绝服务)/DDoS(分布式拒绝服务)攻击的低检测率和高假警报率。本章提出了一种检测DoS攻击的新技术;它使用一组分类器检测DOS攻击,并实时将其可视化。该技术基于网络参数值(数据包)的集合,这些值由简单的几何图形自动表示,以便突出显示相关元素。本文执行了该技术的两个实现。前者基于欧几里得距离,后者基于KNN算法。通过对来自10% KDD的网络流量的模拟以及与其他入侵检测分类技术的比较,证明了所提出技术的有效性。
{"title":"Visualization Technique for Intrusion Detection","authors":"M. Cheikh, S. Hacini, Z. Boufaida","doi":"10.4018/978-1-5225-5583-4.CH011","DOIUrl":"https://doi.org/10.4018/978-1-5225-5583-4.CH011","url":null,"abstract":"Intrusion detection system (IDS) plays a vital and crucial role in a computer security. However, they suffer from a number of problems such as low detection of DoS (denial-of-service)/DDoS (distributed denial-of-service) attacks with a high rate of false alarms. In this chapter, a new technique for detecting DoS attacks is proposed; it detects DOS attacks using a set of classifiers and visualizes them in real time. This technique is based on the collection of network parameter values (data packets), which are automatically represented by simple geometric graphs in order to highlight relevant elements. Two implementations for this technique are performed. The first is based on the Euclidian distance while the second is based on KNN algorithm. The effectiveness of the proposed technique has been proven through a simulation of network traffic drawn from the 10% KDD and a comparison with other classification techniques for intrusion detection.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123691297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Global Naming and Storage System Using Blockchain 使用区块链的全局命名和存储系统
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-0186-3.ch008
Chanti S., Taushif Anwar, Chithralekha T., V. Uma
The global naming systems are used to resolve the DNS (domain name system) queries by providing the IP address of a particular domain. Humans are familiar in remembering the text rather than numbers. So the DNS servers help in resolving the human-readable domain names into system understandable IP address. In the current DNS architecture, there are several threats that cost a lot of damage to the organizations. At the earlier stage, DNS protocol lacks security assurance in place. To solve this issue, they introduced DNSSEC (subsequent DNS) as an additional layer of trust on top of DNS by providing authentication. Still, the current DNS servers couldn't address issues such as DoS/DDoS attacks. To address all these issues, blockchain technology offers an innovative method to handle those challenges. The existing naming systems are centralized, which is a major problem in achieving security.. The main aim of this chapter is to provide an overview of blockchain technology and a brief introduction to blockchain-based naming and storage systems.
全局命名系统通过提供特定域的IP地址来解析DNS (domain name system)查询。人类更容易记住文字而不是数字。因此,DNS服务器帮助将人类可读的域名解析为系统可理解的IP地址。在当前的DNS体系结构中,有几种威胁对组织造成了很大的损害。在早期阶段,DNS协议缺乏安全保障。为了解决这个问题,他们引入了DNSSEC(后续的DNS),通过提供身份验证,作为DNS之上的额外信任层。不过,目前的DNS服务器无法解决DoS/DDoS攻击等问题。为了解决所有这些问题,区块链技术提供了一种创新的方法来应对这些挑战。现有的命名系统是集中式的,这是实现安全性的主要问题。本章的主要目的是概述区块链技术,并简要介绍基于区块链的命名和存储系统。
{"title":"Global Naming and Storage System Using Blockchain","authors":"Chanti S., Taushif Anwar, Chithralekha T., V. Uma","doi":"10.4018/978-1-7998-0186-3.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-0186-3.ch008","url":null,"abstract":"The global naming systems are used to resolve the DNS (domain name system) queries by providing the IP address of a particular domain. Humans are familiar in remembering the text rather than numbers. So the DNS servers help in resolving the human-readable domain names into system understandable IP address. In the current DNS architecture, there are several threats that cost a lot of damage to the organizations. At the earlier stage, DNS protocol lacks security assurance in place. To solve this issue, they introduced DNSSEC (subsequent DNS) as an additional layer of trust on top of DNS by providing authentication. Still, the current DNS servers couldn't address issues such as DoS/DDoS attacks. To address all these issues, blockchain technology offers an innovative method to handle those challenges. The existing naming systems are centralized, which is a major problem in achieving security.. The main aim of this chapter is to provide an overview of blockchain technology and a brief introduction to blockchain-based naming and storage systems.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122681364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The HTTP Flooding Attack Detection to Secure and Safeguard Online Applications in the Cloud HTTP泛洪攻击检测,保障云环境中在线应用的安全
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5348-0.ch024
Dhanapal A, Nithyanandam P
Cloud computing is the cutting edge and has become inevitable in all forms of computing. This is due to its nature of elasticity, cost-effectiveness, availability, etc. The online applications like e-commerce, and e-healthcare applications are moving to the cloud to reduce their operational cost. These applications have the vulnerability of a HTTP flooding Distributed Denial of Service attack in the cloud. This flooding attack aims to overload the application, making it unable to process genuine requests and bring it down. So, these applications need to be secured and safeguarded against such attacks. This HTTP flooding attack is one of the key challenging issues as it shows normal behaviour with regard to all lower networking layers like TCP 3-way handshaking by mimicking genuine requests and it is even harder in the cloud due to the cloud properties. This article offers a solution for detecting a HTTP flooding attack in the cloud by using the novel TriZonal Linear Prediction (TLP) model. The solution was implemented using OpenStack and the FIFA Worldcup '98 data set for experimentation.
云计算是最先进的技术,在所有形式的计算中都是不可避免的。这是由于它的弹性、成本效益、可用性等特性。在线应用程序(如电子商务和电子医疗保健应用程序)正在迁移到云端,以降低其运营成本。这些应用程序在云中具有HTTP泛滥分布式拒绝服务攻击的漏洞。这种泛洪攻击的目的是使应用程序过载,使其无法处理真正的请求并使其崩溃。因此,需要保护这些应用程序免受此类攻击。这种HTTP泛洪攻击是一个关键的挑战问题,因为它通过模仿真正的请求来显示所有较低网络层的正常行为,如TCP 3-way握手,并且由于云的属性,在云中更加困难。本文提出了一种利用新颖的三角线性预测(TLP)模型检测云中的HTTP泛洪攻击的解决方案。该解决方案是使用OpenStack和FIFA世界杯'98数据集进行实验的。
{"title":"The HTTP Flooding Attack Detection to Secure and Safeguard Online Applications in the Cloud","authors":"Dhanapal A, Nithyanandam P","doi":"10.4018/978-1-7998-5348-0.ch024","DOIUrl":"https://doi.org/10.4018/978-1-7998-5348-0.ch024","url":null,"abstract":"Cloud computing is the cutting edge and has become inevitable in all forms of computing. This is due to its nature of elasticity, cost-effectiveness, availability, etc. The online applications like e-commerce, and e-healthcare applications are moving to the cloud to reduce their operational cost. These applications have the vulnerability of a HTTP flooding Distributed Denial of Service attack in the cloud. This flooding attack aims to overload the application, making it unable to process genuine requests and bring it down. So, these applications need to be secured and safeguarded against such attacks. This HTTP flooding attack is one of the key challenging issues as it shows normal behaviour with regard to all lower networking layers like TCP 3-way handshaking by mimicking genuine requests and it is even harder in the cloud due to the cloud properties. This article offers a solution for detecting a HTTP flooding attack in the cloud by using the novel TriZonal Linear Prediction (TLP) model. The solution was implemented using OpenStack and the FIFA Worldcup '98 data set for experimentation.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129093837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Successful Computer Forensics Analysis on the Cyber Attack Botnet 僵尸网络攻击的成功计算机取证分析
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-4100-4.CH014
Kavisankar Leelasankar, C. Chellappan, P. Sivasankar
The success of computer forensics lies in the complete analysis of the evidence that is available. This is done by not only analyzing the evidence which is available but also searching for new concrete evidence. The evidence is obtained through the logs of the data during the cyberattack. When performing analysis of the cyberattack especially the botnet attacks, there are many challenges. First and the foremost is that it hides the identity of the mastermind, the botmaster. It issues the command to be executed using its subordinate, the command and control (C&C). The traceback of C&C itself is a complex task. Secondly, it victimizes the innocent compromised device zombies. This chapter discusses the analysis done in both proactive and reactive ways to resolve these challenges. The chapter ends by discussing the analysis to find the real mastermind to protect the innocent compromised system and to protect the victim system/organization affected by the botnet cyberattack.
计算机取证的成功在于对现有证据的完整分析。要做到这一点,不仅要分析现有的证据,还要寻找新的具体证据。证据是通过网络攻击过程中数据的日志获取的。在对网络攻击特别是僵尸网络攻击进行分析时,面临着许多挑战。首先也是最重要的是,它隐藏了主谋的身份。它使用它的下级命令和控制(C&C)发出要执行的命令。C&C的回溯本身就是一项复杂的任务。其次,它使无辜的受感染设备僵尸受害。本章讨论了以主动和被动两种方式进行的分析,以解决这些挑战。本章最后通过分析讨论,找到真正的主谋,保护无辜的受损系统,保护受僵尸网络攻击影响的受害系统/组织。
{"title":"Successful Computer Forensics Analysis on the Cyber Attack Botnet","authors":"Kavisankar Leelasankar, C. Chellappan, P. Sivasankar","doi":"10.4018/978-1-5225-4100-4.CH014","DOIUrl":"https://doi.org/10.4018/978-1-5225-4100-4.CH014","url":null,"abstract":"The success of computer forensics lies in the complete analysis of the evidence that is available. This is done by not only analyzing the evidence which is available but also searching for new concrete evidence. The evidence is obtained through the logs of the data during the cyberattack. When performing analysis of the cyberattack especially the botnet attacks, there are many challenges. First and the foremost is that it hides the identity of the mastermind, the botmaster. It issues the command to be executed using its subordinate, the command and control (C&C). The traceback of C&C itself is a complex task. Secondly, it victimizes the innocent compromised device zombies. This chapter discusses the analysis done in both proactive and reactive ways to resolve these challenges. The chapter ends by discussing the analysis to find the real mastermind to protect the innocent compromised system and to protect the victim system/organization affected by the botnet cyberattack.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116120544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Denial-of-Service (DoS) Attack and Botnet 拒绝服务(DoS)攻击和僵尸网络
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5348-0.ch003
Arushi Arora, S. Yadav, Kavita Sharma
This chapter describes how the consequence and hazards showcased by Denial of Service attacks have resulted in the surge of research studies, commercial software and innovative cogitations. Of the DoS attacks, the incursion of its variant DDoS can be quite severe. A botnet, on the other hand, is a group of hijacked devices that are connected by internet. These botnet servers are used to perform DDoS attacks effectively. In this chapter, the authors attempt to provide an insight into DoS attacks and botnets, focusing on their analysis and mitigation. They also propose a defense mechanism to mitigate our system from botnet DDoS attacks. This is achieved by using a through access list based configuration. The artful engineering of malware is a weapon used for online crime and the ideas behind it are profit-motivated. The last section of the chapter provides an understanding of the WannaCry Ransomware Attack which locked computers in more than 150 countries.
本章描述了拒绝服务攻击的后果和危害如何导致了研究、商业软件和创新思维的激增。在DoS攻击中,其变种DDoS的入侵可能相当严重。另一方面,僵尸网络是一组通过互联网连接的被劫持设备。这些僵尸网络服务器用于有效地执行DDoS攻击。在本章中,作者试图提供对DoS攻击和僵尸网络的深入了解,重点关注它们的分析和缓解。他们还提出了一种防御机制,以减轻我们的系统从僵尸网络DDoS攻击。这是通过使用基于直通访问列表的配置来实现的。恶意软件的巧妙设计是用于在线犯罪的武器,其背后的想法是受利润驱动的。本章的最后一部分提供了对WannaCry勒索软件攻击的理解,该攻击锁定了150多个国家的计算机。
{"title":"Denial-of-Service (DoS) Attack and Botnet","authors":"Arushi Arora, S. Yadav, Kavita Sharma","doi":"10.4018/978-1-7998-5348-0.ch003","DOIUrl":"https://doi.org/10.4018/978-1-7998-5348-0.ch003","url":null,"abstract":"This chapter describes how the consequence and hazards showcased by Denial of Service attacks have resulted in the surge of research studies, commercial software and innovative cogitations. Of the DoS attacks, the incursion of its variant DDoS can be quite severe. A botnet, on the other hand, is a group of hijacked devices that are connected by internet. These botnet servers are used to perform DDoS attacks effectively. In this chapter, the authors attempt to provide an insight into DoS attacks and botnets, focusing on their analysis and mitigation. They also propose a defense mechanism to mitigate our system from botnet DDoS attacks. This is achieved by using a through access list based configuration. The artful engineering of malware is a weapon used for online crime and the ideas behind it are profit-motivated. The last section of the chapter provides an understanding of the WannaCry Ransomware Attack which locked computers in more than 150 countries.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122511140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IP-CHOCK Reference Detection and Prevention of Denial of Service (DoS) Attacks in Vehicular Ad-Hoc Network 车载Ad-Hoc网络中IP-CHOCK引用检测及拒绝服务攻击防范
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5348-0.ch030
K. Verma
Vehicular Ad-Hoc Network (VANET) is a subset of Mobile Ad-Hoc Network (MANET) and it is considered as a substantial component of Intelligent Transportation System (ITS). DoS attacks on VANET are varying and may be overwhelmed by VANET protocols, such as TCP or UDP flooding attacks. Different secure communications models can be used to detect and prevent IP spoofing DoS attacks, by which the attacks are committed by fraudulent and malicious nodes. In this chapter, an efficient detection method has been proposed to detect UDP flooding attacks, called Bloom-Filter-Based IP-CHOCK (BFICK). A prevention method using IP-CHOCK has also been proposed to prevent DoS, called Reference Broadcast Synchronization (RBS). In principle, the combined method is based on the IP-CHOCK filter concept of packets during an attack incident and with busy traffic condition. Fake identities from malicious vehicles can be analyzed with help of the existing reliable IP addresses. Beacon packets were exchanged periodically by all the vehicles to announce their presence and to forward it to the next node.
车载自组织网络(VANET)是移动自组织网络(MANET)的子集,是智能交通系统(ITS)的重要组成部分。针对VANET的DoS攻击多种多样,可能会被VANET协议(如TCP或UDP泛洪攻击)所淹没。通过不同的安全通信模型,可以检测和防止IP欺骗式DoS攻击,这种攻击是由欺诈和恶意节点发起的。本章提出了一种有效的检测UDP泛洪攻击的方法,即基于bloom - filter的IP-CHOCK (BFICK)。还提出了一种使用IP-CHOCK防止DoS的方法,称为参考广播同步(RBS)。在原理上,组合方法是基于IP-CHOCK在攻击事件和流量繁忙情况下对数据包进行过滤的概念。恶意车辆的虚假身份可以借助现有的可靠IP地址进行分析。所有车辆定期交换信标数据包,以宣布它们的存在并将其转发给下一个节点。
{"title":"IP-CHOCK Reference Detection and Prevention of Denial of Service (DoS) Attacks in Vehicular Ad-Hoc Network","authors":"K. Verma","doi":"10.4018/978-1-7998-5348-0.ch030","DOIUrl":"https://doi.org/10.4018/978-1-7998-5348-0.ch030","url":null,"abstract":"Vehicular Ad-Hoc Network (VANET) is a subset of Mobile Ad-Hoc Network (MANET) and it is considered as a substantial component of Intelligent Transportation System (ITS). DoS attacks on VANET are varying and may be overwhelmed by VANET protocols, such as TCP or UDP flooding attacks. Different secure communications models can be used to detect and prevent IP spoofing DoS attacks, by which the attacks are committed by fraudulent and malicious nodes. In this chapter, an efficient detection method has been proposed to detect UDP flooding attacks, called Bloom-Filter-Based IP-CHOCK (BFICK). A prevention method using IP-CHOCK has also been proposed to prevent DoS, called Reference Broadcast Synchronization (RBS). In principle, the combined method is based on the IP-CHOCK filter concept of packets during an attack incident and with busy traffic condition. Fake identities from malicious vehicles can be analyzed with help of the existing reliable IP addresses. Beacon packets were exchanged periodically by all the vehicles to announce their presence and to forward it to the next node.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132765433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DOS Attacks on Cloud Platform 云平台DOS攻击
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5348-0.ch025
Rohit Kumar
IaaS, PaaS, and SaaS models collectively form the Cloud Computing Infrastructure. The complexity of interrelationship of service models is very high and so security issue becomes essentials and must be developed with utmost care. Distributed DOS attacks are a major concern for different organization engaged in using cloud based services. The denial of service attack and distributed denial of service attacks in particular in cloud paradigms are big threat on a cloud network or platform. These attacks operate by rendering the server and network useless by sending unnecessary service and resource requests. The victims host or network isn't aware of such attacks and keeps providing recourses until they get exhausted. Due to resource exhaustions, the resources requests of genuine users doesn't get fulfilled. Severity of these attacks can lead to huge financial losses if, they are able to bring down servers executing financial services. This chapter presents DOS threats and methods to mitigate them in varied dimensions.
IaaS、PaaS和SaaS模型共同构成了云计算基础设施。服务模型之间相互关系的复杂性非常高,因此安全问题变得至关重要,必须非常小心地进行开发。分布式DOS攻击是使用基于云的服务的不同组织的主要关注点。拒绝服务攻击和分布式拒绝服务攻击是云网络或平台面临的重大威胁,尤其是在云范式中。这些攻击通过发送不必要的服务和资源请求,使服务器和网络变得无用。受害者主机或网络不知道这种攻击,并不断提供资源,直到他们筋疲力尽。由于资源耗尽,真正用户的资源请求无法得到满足。如果这些攻击能够使执行金融服务的服务器瘫痪,其严重性可能导致巨大的经济损失。本章从不同的角度介绍了DOS威胁和减轻它们的方法。
{"title":"DOS Attacks on Cloud Platform","authors":"Rohit Kumar","doi":"10.4018/978-1-7998-5348-0.ch025","DOIUrl":"https://doi.org/10.4018/978-1-7998-5348-0.ch025","url":null,"abstract":"IaaS, PaaS, and SaaS models collectively form the Cloud Computing Infrastructure. The complexity of interrelationship of service models is very high and so security issue becomes essentials and must be developed with utmost care. Distributed DOS attacks are a major concern for different organization engaged in using cloud based services. The denial of service attack and distributed denial of service attacks in particular in cloud paradigms are big threat on a cloud network or platform. These attacks operate by rendering the server and network useless by sending unnecessary service and resource requests. The victims host or network isn't aware of such attacks and keeps providing recourses until they get exhausted. Due to resource exhaustions, the resources requests of genuine users doesn't get fulfilled. Severity of these attacks can lead to huge financial losses if, they are able to bring down servers executing financial services. This chapter presents DOS threats and methods to mitigate them in varied dimensions.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121139813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Research Anthology on Combating Denial-of-Service Attacks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1