scispace - formally typeset
Proceedings ArticleDOI

Monitoring application for DoS attacks using group-testing

Reads0
Chats0
TLDR
A semi-Markov model anomaly detector will help to describe the dynamics of access matrix and to detect the attacks and preliminary simulation results regarding the efficiency and practicability of this new scheme are provided.
Abstract
This research paper is proposing one monitoring application for Denial of Service (DoS) with use of group testing approach. Here a semi-Markov model anomaly detector will help to describe the dynamics of access matrix and to detect the attacks. The focus of this work lies in the detection algorithms proposed and the corresponding theoretical complexity analysis. We also provide preliminary simulation results regarding the efficiency and practicability of this new scheme. Further discussions over implementation issues and performance enhancements are also appended to show its great potentials.

read more

References
More filters
Journal ArticleDOI

A taxonomy of DDoS attack and DDoS defense mechanisms

TL;DR: This paper presents two taxonomies for classifying attacks and defenses in distributed denial-of-service (DDoS) and provides researchers with a better understanding of the problem and the current solution space.
Proceedings ArticleDOI

Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites

TL;DR: An enhancement to CDNs is proposed that offers better protection to Web sites against flash events and trace-driven simulations are used to study the effect of the enhancement on CDNs and Web sites.

Resisting SYN flood DoS attacks with a SYN cache

TL;DR: This paper discusses several approaches for dealing with the exhaustion problem, including SYN caches and SYN cookies, and the implementation of the specific solution used in FreeBSD is analyzed.
Book ChapterDOI

Proactively detecting distributed denial of service attacks using source IP address monitoring

TL;DR: Wang et al. as mentioned in this paper proposed a simple but robust scheme to detect denial of service attacks by monitoring the increase of new IP addresses, which makes it hard for the attacker to counter this detection scheme by changing their attack signature.
Proceedings ArticleDOI

DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection

TL;DR: This paper considers sophisticated attacks that are protocol-compliant, non-intrusive, and utilize legitimate application-layer requests to overwhelm system resources, and proposes a counter-mechanism that consists of a suspicion assignment mechanism and a DDoS-resilient scheduler, DDoS Shield.
Related Papers (5)