Proceedings ArticleDOI
Monitoring application for DoS attacks using group-testing
Vijay Kumar Gurani,P. G. Shynu,Chiranji Lal Chowdhary +2 more
- pp 1-4
Reads0
Chats0
TLDR
A semi-Markov model anomaly detector will help to describe the dynamics of access matrix and to detect the attacks and preliminary simulation results regarding the efficiency and practicability of this new scheme are provided.Abstract:
This research paper is proposing one monitoring application for Denial of Service (DoS) with use of group testing approach. Here a semi-Markov model anomaly detector will help to describe the dynamics of access matrix and to detect the attacks. The focus of this work lies in the detection algorithms proposed and the corresponding theoretical complexity analysis. We also provide preliminary simulation results regarding the efficiency and practicability of this new scheme. Further discussions over implementation issues and performance enhancements are also appended to show its great potentials.read more
References
More filters
Journal ArticleDOI
A taxonomy of DDoS attack and DDoS defense mechanisms
Jelena Mirkovic,Peter Reiher +1 more
TL;DR: This paper presents two taxonomies for classifying attacks and defenses in distributed denial-of-service (DDoS) and provides researchers with a better understanding of the problem and the current solution space.
Proceedings ArticleDOI
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
TL;DR: An enhancement to CDNs is proposed that offers better protection to Web sites against flash events and trace-driven simulations are used to study the effect of the enhancement on CDNs and Web sites.
Resisting SYN flood DoS attacks with a SYN cache
TL;DR: This paper discusses several approaches for dealing with the exhaustion problem, including SYN caches and SYN cookies, and the implementation of the specific solution used in FreeBSD is analyzed.
Book ChapterDOI
Proactively detecting distributed denial of service attacks using source IP address monitoring
TL;DR: Wang et al. as mentioned in this paper proposed a simple but robust scheme to detect denial of service attacks by monitoring the increase of new IP addresses, which makes it hard for the attacker to counter this detection scheme by changing their attack signature.
Proceedings ArticleDOI
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
TL;DR: This paper considers sophisticated attacks that are protocol-compliant, non-intrusive, and utilize legitimate application-layer requests to overwhelm system resources, and proposes a counter-mechanism that consists of a suspicion assignment mechanism and a DDoS-resilient scheduler, DDoS Shield.