DDDOST:在无线宽带网络中使用定时器分布式检测DOS攻击

I. J. Jingle, E. Rajsingh
{"title":"DDDOST:在无线宽带网络中使用定时器分布式检测DOS攻击","authors":"I. J. Jingle, E. Rajsingh","doi":"10.1109/ICOAC.2012.6416795","DOIUrl":null,"url":null,"abstract":"Wireless broadband networks are most vulnerable to denial-of-service attacks where attackers can disrupt legitimate communication between hosts in a network by flooding unwanted traffic between legitimate hosts. This paper proposes DDDOST, a novel approach for filtering flooding attack, the most severe denial-of-service attack that occurs at the transport layer of the internet. Flooding attack at the transport layer affects the transmission control protocol's three-way handshake process, thereby denying the services of TCP. It also denies the services of user datagram protocol. The main objective of this approach is to install local and global monitoring agents at various points in the network in order to monitor and filter real-time TCP traffic and UDP traffic thereby allowing legitimate traffic to flow in the network during attack traffic filtration process and to avoid buffer overflow at the monitoring agents. DDDOST consists of a novel agreement mechanism and a novel detection algorithm and it works taking the clock values of each node into account for effective detection of the attack which has not been used in the existing defense mechanisms. All nodes within a network are permitted to have a synchronized clock value. In the agreement mechanism, the IP address spoofing is prevented which forms the gateway for flooding attacks and once IP spoofing is prevented, the detection mechanism is carried out in detecting and filtering flooding attacks. This distributed defense mechanism reduces the burden on a single global monitoring agent thereby introducing local monitoring agents at various points in the network. The performance results show that this approach effectively and accurately detects and filters DOS attacks within a short period. The performance of this proposed mechanism has been measured in terms of time delay and false positive ratio and it is compared with existing defense mechanisms and it is found to be effective over existing defense mechanisms.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"DDDOST: Distributed detection of DOS attack using timers in wireless broadband networks\",\"authors\":\"I. J. Jingle, E. Rajsingh\",\"doi\":\"10.1109/ICOAC.2012.6416795\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless broadband networks are most vulnerable to denial-of-service attacks where attackers can disrupt legitimate communication between hosts in a network by flooding unwanted traffic between legitimate hosts. This paper proposes DDDOST, a novel approach for filtering flooding attack, the most severe denial-of-service attack that occurs at the transport layer of the internet. Flooding attack at the transport layer affects the transmission control protocol's three-way handshake process, thereby denying the services of TCP. It also denies the services of user datagram protocol. The main objective of this approach is to install local and global monitoring agents at various points in the network in order to monitor and filter real-time TCP traffic and UDP traffic thereby allowing legitimate traffic to flow in the network during attack traffic filtration process and to avoid buffer overflow at the monitoring agents. DDDOST consists of a novel agreement mechanism and a novel detection algorithm and it works taking the clock values of each node into account for effective detection of the attack which has not been used in the existing defense mechanisms. All nodes within a network are permitted to have a synchronized clock value. In the agreement mechanism, the IP address spoofing is prevented which forms the gateway for flooding attacks and once IP spoofing is prevented, the detection mechanism is carried out in detecting and filtering flooding attacks. This distributed defense mechanism reduces the burden on a single global monitoring agent thereby introducing local monitoring agents at various points in the network. The performance results show that this approach effectively and accurately detects and filters DOS attacks within a short period. The performance of this proposed mechanism has been measured in terms of time delay and false positive ratio and it is compared with existing defense mechanisms and it is found to be effective over existing defense mechanisms.\",\"PeriodicalId\":286985,\"journal\":{\"name\":\"2012 Fourth International Conference on Advanced Computing (ICoAC)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Fourth International Conference on Advanced Computing (ICoAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOAC.2012.6416795\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Advanced Computing (ICoAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOAC.2012.6416795","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

无线宽带网络最容易受到拒绝服务攻击,攻击者可以通过在合法主机之间大量发送不需要的通信来破坏网络中主机之间的合法通信。针对互联网传输层中最严重的拒绝服务攻击——洪水攻击,本文提出了一种新的DDDOST过滤方法。传输层的泛洪攻击会影响传输控制协议的三次握手过程,从而阻断TCP的服务。它还拒绝用户数据报协议的服务。这种方法的主要目的是在网络的各个点安装本地和全局监控代理,以便监控和过滤实时TCP流量和UDP流量,从而在攻击流量过滤过程中允许合法流量在网络中流动,并避免监控代理的缓冲区溢出。DDDOST由一种新的协议机制和一种新的检测算法组成,它考虑了每个节点的时钟值,从而有效地检测到现有防御机制中没有使用的攻击。一个网络中的所有节点都允许拥有一个同步的时钟值。在协议机制中,防止IP地址欺骗成为泛洪攻击的网关,防止IP地址欺骗后,进行泛洪攻击的检测和过滤。这种分布式防御机制减少了单个全局监视代理的负担,从而在网络中的不同点引入了本地监视代理。性能测试结果表明,该方法能在短时间内有效、准确地检测和过滤DOS攻击。通过时间延迟和误报率对该机制的性能进行了测量,并与现有的防御机制进行了比较,发现该机制比现有的防御机制更有效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
DDDOST: Distributed detection of DOS attack using timers in wireless broadband networks
Wireless broadband networks are most vulnerable to denial-of-service attacks where attackers can disrupt legitimate communication between hosts in a network by flooding unwanted traffic between legitimate hosts. This paper proposes DDDOST, a novel approach for filtering flooding attack, the most severe denial-of-service attack that occurs at the transport layer of the internet. Flooding attack at the transport layer affects the transmission control protocol's three-way handshake process, thereby denying the services of TCP. It also denies the services of user datagram protocol. The main objective of this approach is to install local and global monitoring agents at various points in the network in order to monitor and filter real-time TCP traffic and UDP traffic thereby allowing legitimate traffic to flow in the network during attack traffic filtration process and to avoid buffer overflow at the monitoring agents. DDDOST consists of a novel agreement mechanism and a novel detection algorithm and it works taking the clock values of each node into account for effective detection of the attack which has not been used in the existing defense mechanisms. All nodes within a network are permitted to have a synchronized clock value. In the agreement mechanism, the IP address spoofing is prevented which forms the gateway for flooding attacks and once IP spoofing is prevented, the detection mechanism is carried out in detecting and filtering flooding attacks. This distributed defense mechanism reduces the burden on a single global monitoring agent thereby introducing local monitoring agents at various points in the network. The performance results show that this approach effectively and accurately detects and filters DOS attacks within a short period. The performance of this proposed mechanism has been measured in terms of time delay and false positive ratio and it is compared with existing defense mechanisms and it is found to be effective over existing defense mechanisms.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Realization of gateway relocation using admission control algorithm in mobile WiMAX networks Where are you? A location awareness system Atmospheric correction of remotely sensed multispectral satellite images in transform domain Vehicle detection in aerial surveillance using morphological shared-pixels neural (MSPN) networks SVM-instance based approach to improve QoS parameters for time critical applications in WSN
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1