首页 > 最新文献

Research Anthology on Combating Denial-of-Service Attacks最新文献

英文 中文
DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN 基于SDN机器学习技术的DDoS攻击和防御机制
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-0373-7.ch008
Rochak Swami, M. Dave, V. Ranga
Distributed denial of service (DDoS) attack is one of the most disastrous attacks that compromises the resources and services of the server. DDoS attack makes the services unavailable for its legitimate users by flooding the network with illegitimate traffic. Most commonly, it targets the bandwidth and resources of the server. This chapter discusses various types of DDoS attacks with their behavior. It describes the state-of-the-art of DDoS attacks. An emerging technology named “Software-defined networking” (SDN) has been developed for new generation networks. It has become a trending way of networking. Due to the centralized networking technology, SDN suffers from DDoS attacks. SDN controller manages the functionality of the complete network. Therefore, it is the most vulnerable target of the attackers to be attacked. This work illustrates how DDoS attacks affect the whole working of SDN. The objective of this chapter is also to provide a better understanding of DDoS attacks and how machine learning approaches may be used for detecting DDoS attacks.
分布式拒绝服务(DDoS)攻击是危害服务器资源和服务的最严重的攻击之一。DDoS攻击通过向网络中注入大量非法流量,使合法用户无法正常使用业务。最常见的是,它以服务器的带宽和资源为目标。本章讨论了各种类型的DDoS攻击及其行为。它描述了DDoS攻击的最新技术。针对新一代网络,开发了一种名为“软件定义网络”(SDN)的新兴技术。它已经成为一种流行的网络方式。由于采用集中式组网技术,SDN容易遭受DDoS攻击。SDN控制器管理整个网络的功能。因此,它是攻击者最容易攻击的目标。这项工作说明了DDoS攻击如何影响SDN的整个工作。本章的目的也是为了更好地理解DDoS攻击,以及如何使用机器学习方法来检测DDoS攻击。
{"title":"DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN","authors":"Rochak Swami, M. Dave, V. Ranga","doi":"10.4018/978-1-7998-0373-7.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-0373-7.ch008","url":null,"abstract":"Distributed denial of service (DDoS) attack is one of the most disastrous attacks that compromises the resources and services of the server. DDoS attack makes the services unavailable for its legitimate users by flooding the network with illegitimate traffic. Most commonly, it targets the bandwidth and resources of the server. This chapter discusses various types of DDoS attacks with their behavior. It describes the state-of-the-art of DDoS attacks. An emerging technology named “Software-defined networking” (SDN) has been developed for new generation networks. It has become a trending way of networking. Due to the centralized networking technology, SDN suffers from DDoS attacks. SDN controller manages the functionality of the complete network. Therefore, it is the most vulnerable target of the attackers to be attacked. This work illustrates how DDoS attacks affect the whole working of SDN. The objective of this chapter is also to provide a better understanding of DDoS attacks and how machine learning approaches may be used for detecting DDoS attacks.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124600829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Zero-Crossing Analysis of Lévy Walks and a DDoS Dataset for Real-Time Feature Extraction lsamvy行走的过零分析及实时特征提取的DDoS数据集
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5348-0.ch021
J. D. T. Gonzalez, W. Kinsner
A comparison between the probability similarities of a Distributed Denial-of-Service (DDoS) dataset and Lévy walks is presented. This effort validates Lévy walks as a model resembling DDoS probability features. In addition, a method, based on the Smirnov transform, for generating synthetic data with the statistical properties of Lévy-walks is demonstrated. The Smirnov transform is used to address a cybersecurity problem associated with the Internet-of-things (IoT). The synthetic Lévy-walk is merged with sections of distinct signals (uniform noise, Gaussian noise, and an ordinary sinusoid). Zero-crossing rate (ZCR) within a varying-size window is utilized to analyze both the composite signal and the DDoS dataset. ZCR identifies all the distinct sections in the composite signal and successfully detects the occurrence of the cyberattack. The ZCR value increases as the signal under analysis becomes more complex and produces steadier values as the varying window size increases. The ZCR computation directly in the time-domain is its most notorious advantage for real-time implementations.
比较了分布式拒绝服务(DDoS)数据集和lsamvy游动的概率相似性。这项工作验证了lsamvy游动是一种类似于DDoS概率特征的模型。此外,本文还给出了一种基于Smirnov变换的合成数据的生成方法,该方法具有lsamv -walks的统计特性。斯米尔诺夫变换用于解决与物联网(IoT)相关的网络安全问题。合成的lsamv -walk与不同信号(均匀噪声、高斯噪声和普通正弦波)的部分合并。利用变大小窗口内的过零率(ZCR)来分析复合信号和DDoS数据集。ZCR识别复合信号中所有不同的部分,并成功检测到网络攻击的发生。ZCR值随着分析的信号变得更复杂而增加,随着窗口大小的变化而产生更稳定的值。直接在时域进行ZCR计算是其实时实现的最大优势。
{"title":"Zero-Crossing Analysis of Lévy Walks and a DDoS Dataset for Real-Time Feature Extraction","authors":"J. D. T. Gonzalez, W. Kinsner","doi":"10.4018/978-1-7998-5348-0.ch021","DOIUrl":"https://doi.org/10.4018/978-1-7998-5348-0.ch021","url":null,"abstract":"A comparison between the probability similarities of a Distributed Denial-of-Service (DDoS) dataset and Lévy walks is presented. This effort validates Lévy walks as a model resembling DDoS probability features. In addition, a method, based on the Smirnov transform, for generating synthetic data with the statistical properties of Lévy-walks is demonstrated. The Smirnov transform is used to address a cybersecurity problem associated with the Internet-of-things (IoT). The synthetic Lévy-walk is merged with sections of distinct signals (uniform noise, Gaussian noise, and an ordinary sinusoid). Zero-crossing rate (ZCR) within a varying-size window is utilized to analyze both the composite signal and the DDoS dataset. ZCR identifies all the distinct sections in the composite signal and successfully detects the occurrence of the cyberattack. The ZCR value increases as the signal under analysis becomes more complex and produces steadier values as the varying window size increases. The ZCR computation directly in the time-domain is its most notorious advantage for real-time implementations.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131397564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Botnet Threats to E-Commerce Web Applications and Their Detection 僵尸网络对电子商务Web应用的威胁及其检测
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-3646-8.CH003
Rizwan Ur Rahman, D. Tomar
Security issues in e-commerce web applications are still exploratory, and in spite of an increase in e-commerce application research and development, lots of security challenges remain unanswered. Botnets are the most malicious threats to web applications, especially the e-commerce applications. Botnet is a network of BOTs. It executes automated scripts to launch different types of attack on web applications. Botnets are typically controlled by one or more hackers known as Bot masters and are exploited for different types of attacks including Dos (denial of service), DDos (distributed denial of service), phishing, spreading of malware, adware, Spyware, identity fraud, and logic bombs. The aim of this chapter is to scrutinize to what degree botnets can cause a threat to e-commerce security. In the first section, an adequate overview of botnets in the context of e-commerce security is presented in order to provide the reader with an understanding of the background for the remaining sections.
电子商务web应用的安全问题仍处于探索性阶段,尽管电子商务应用的研究和开发不断增加,但仍有许多安全挑战未得到解决。僵尸网络是对web应用程序,特别是电子商务应用程序的最大恶意威胁。僵尸网络是由bot组成的网络。它执行自动脚本,对web应用程序发起不同类型的攻击。僵尸网络通常由一个或多个被称为僵尸主机的黑客控制,并被用于不同类型的攻击,包括Dos(拒绝服务)、DDos(分布式拒绝服务)、网络钓鱼、恶意软件传播、广告软件、间谍软件、身份欺诈和逻辑炸弹。本章的目的是仔细研究僵尸网络对电子商务安全造成威胁的程度。在第一部分中,对电子商务安全背景下的僵尸网络进行了充分的概述,以便为读者提供对其余部分背景的理解。
{"title":"Botnet Threats to E-Commerce Web Applications and Their Detection","authors":"Rizwan Ur Rahman, D. Tomar","doi":"10.4018/978-1-5225-3646-8.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-3646-8.CH003","url":null,"abstract":"Security issues in e-commerce web applications are still exploratory, and in spite of an increase in e-commerce application research and development, lots of security challenges remain unanswered. Botnets are the most malicious threats to web applications, especially the e-commerce applications. Botnet is a network of BOTs. It executes automated scripts to launch different types of attack on web applications. Botnets are typically controlled by one or more hackers known as Bot masters and are exploited for different types of attacks including Dos (denial of service), DDos (distributed denial of service), phishing, spreading of malware, adware, Spyware, identity fraud, and logic bombs. The aim of this chapter is to scrutinize to what degree botnets can cause a threat to e-commerce security. In the first section, an adequate overview of botnets in the context of e-commerce security is presented in order to provide the reader with an understanding of the background for the remaining sections.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Denial of Service (DoS) Attacks Over Cloud Environment 云环境下的拒绝服务攻击
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5348-0.ch026
T. M., N. S, Sindhuja R
Cloud computing is the fastest growing technology in today's world. Cloud services provide pay as go models on capacity or usage. For providing better cloud services, capacity planning is very important. Proper capacity planning will maximize efficiency and on the other side proper control over the resources will help to overcome from attacks. As the technology develops in one side, threats and vulnerabilities to security also increases on the other side. A complete analysis of Denial of Service (DOS) attacks in cloud computing and how are they done in the cloud environment and the impact of reduced capacity in cloud causes greater significance. Among all the cloud computing attacks, DOS is a major threat to the cloud environment. In this book chapter, we are going to discuss DOS attack in the cloud and its types, what are the tools used to perform DOS attack and how they are detected and prevented. Finally it deals with the measures to protect the cloud services from DOS attack and also penetration testing for DOS attack.
云计算是当今世界发展最快的技术。云服务提供按容量或使用情况付费的模式。为了提供更好的云服务,容量规划非常重要。适当的容量规划将使效率最大化,另一方面,对资源的适当控制将有助于克服攻击。随着一方技术的发展,另一方的安全威胁和漏洞也在增加。全面分析云计算中的拒绝服务(DOS)攻击及其在云环境中是如何进行的,以及云中容量减少的影响具有更大的意义。在各种云计算攻击中,DOS是对云环境的主要威胁。在本书的这一章中,我们将讨论云中的DOS攻击及其类型,用于执行DOS攻击的工具以及如何检测和阻止它们。最后讨论了云服务防御DOS攻击的措施以及针对DOS攻击的渗透测试。
{"title":"Denial of Service (DoS) Attacks Over Cloud Environment","authors":"T. M., N. S, Sindhuja R","doi":"10.4018/978-1-7998-5348-0.ch026","DOIUrl":"https://doi.org/10.4018/978-1-7998-5348-0.ch026","url":null,"abstract":"Cloud computing is the fastest growing technology in today's world. Cloud services provide pay as go models on capacity or usage. For providing better cloud services, capacity planning is very important. Proper capacity planning will maximize efficiency and on the other side proper control over the resources will help to overcome from attacks. As the technology develops in one side, threats and vulnerabilities to security also increases on the other side. A complete analysis of Denial of Service (DOS) attacks in cloud computing and how are they done in the cloud environment and the impact of reduced capacity in cloud causes greater significance. Among all the cloud computing attacks, DOS is a major threat to the cloud environment. In this book chapter, we are going to discuss DOS attack in the cloud and its types, what are the tools used to perform DOS attack and how they are detected and prevented. Finally it deals with the measures to protect the cloud services from DOS attack and also penetration testing for DOS attack.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123962398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Threat in Internet of Things and Its Mitigation Analysis 物联网中的恶意软件威胁及其缓解分析
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9742-1.CH016
S. Yamaguchi, B. Gupta
This chapter introduces malware's threat in the internet of things (IoT) and then analyzes the mitigation methods against the threat. In September 2016, Brian Krebs' web site “Krebs on Security” came under a massive distributed denial of service (DDoS) attack. It reached twice the size of the largest attack in history. This attack was caused by a new type of malware called Mirai. Mirai primarily targets IoT devices such as security cameras and wireless routers. IoT devices have some properties which make them malware attack's targets such as large volume, pervasiveness, and high vulnerability. As a result, a DDoS attack launched by infected IoT devices tends to become massive and disruptive. Thus, the threat of Mirai is an extremely important issue. Mirai has been attracting a great deal of attention since its birth. This resulted in a lot of information related to IoT malware. Most of them came from not academia but industry represented by antivirus software makers. This chapter summarizes such information.
本章介绍了恶意软件在物联网中的威胁,并分析了针对恶意软件威胁的缓解方法。2016年9月,布莱恩·克雷布斯的网站“克雷布斯安全”遭到了大规模的分布式拒绝服务(DDoS)攻击。它的规模是历史上最大规模袭击的两倍。这次攻击是由一种名为Mirai的新型恶意软件引起的。Mirai主要针对安全摄像头和无线路由器等物联网设备。物联网设备具有一些属性,使其成为恶意软件攻击的目标,例如体积大,普遍性和高脆弱性。因此,受感染的物联网设备发起的DDoS攻击往往会变得大规模和破坏性。因此,Mirai的威胁是一个极其重要的问题。Mirai自诞生以来一直备受关注。这导致了大量与物联网恶意软件相关的信息。他们中的大多数不是来自学术界,而是来自以杀毒软件制造商为代表的行业。本章总结了这些信息。
{"title":"Malware Threat in Internet of Things and Its Mitigation Analysis","authors":"S. Yamaguchi, B. Gupta","doi":"10.4018/978-1-5225-9742-1.CH016","DOIUrl":"https://doi.org/10.4018/978-1-5225-9742-1.CH016","url":null,"abstract":"This chapter introduces malware's threat in the internet of things (IoT) and then analyzes the mitigation methods against the threat. In September 2016, Brian Krebs' web site “Krebs on Security” came under a massive distributed denial of service (DDoS) attack. It reached twice the size of the largest attack in history. This attack was caused by a new type of malware called Mirai. Mirai primarily targets IoT devices such as security cameras and wireless routers. IoT devices have some properties which make them malware attack's targets such as large volume, pervasiveness, and high vulnerability. As a result, a DDoS attack launched by infected IoT devices tends to become massive and disruptive. Thus, the threat of Mirai is an extremely important issue. Mirai has been attracting a great deal of attention since its birth. This resulted in a lot of information related to IoT malware. Most of them came from not academia but industry represented by antivirus software makers. This chapter summarizes such information.","PeriodicalId":417372,"journal":{"name":"Research Anthology on Combating Denial-of-Service Attacks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130499058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
Research Anthology on Combating Denial-of-Service Attacks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1