CFP last date
20 January 2025
Reseach Article

Software based Low Rate DoS Attack Detection Mechanism

by Rejo Mathew, Vijay Katkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Number 6
Year of Publication: 2011
Authors: Rejo Mathew, Vijay Katkar
10.5120/2439-3285

Rejo Mathew, Vijay Katkar . Software based Low Rate DoS Attack Detection Mechanism. International Journal of Computer Applications. 20, 6 ( April 2011), 14-18. DOI=10.5120/2439-3285

@article{ 10.5120/2439-3285,
author = { Rejo Mathew, Vijay Katkar },
title = { Software based Low Rate DoS Attack Detection Mechanism },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 20 },
number = { 6 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 14-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume20/number6/2439-3285/ },
doi = { 10.5120/2439-3285 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:03.296347+05:30
%A Rejo Mathew
%A Vijay Katkar
%T Software based Low Rate DoS Attack Detection Mechanism
%J International Journal of Computer Applications
%@ 0975-8887
%V 20
%N 6
%P 14-18
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Existing DoS attack detection tools are unable to detect Low rate DoS (LDoS) attacks. Many researchers have proposed mechanisms to detect LdoS attack. But they require modifications to the existing infrastructure or protocols which is not practical. There should be a lightweight mechanism which could be integrated with existing Intrusion Detection Systems. This paper proposes a lightweight software-based approach for LdoS detection which could be integrated with existing Intrusion detection system and does not require any change in existing infrastructure and protocol.Experimental results are provided to support the effectiveness and efficiency of proposed mechanism.

References
  1. Haibin Sun, John C.S. Lui, David K.Y. Yau, ,“Defending Against Low-rate TCP Attacks: Dynamic Detection and Protection”,Proceedings of the 12th IEEE International Conference on Network Protocols (2004)
  2. C. Jin, H. Wang and K. Shin: Hop-Count Filtering, “An Effective Defense against Spoofed DoS Traffic”, ACM CCS (2003)
  3. J.C.C. Rodriguez, A.P. Briones and J.A. Nolazco, “Dynamic DDoS Mitigation based on TTL field using fuzzy logic”,CONIELECOMP ’07, Mexico (2007)
  4. Gautam Thatte, Urbashi Mitra and John Heidemann, “Detection of Low-Rate Attacks in Computer Networks”, University of Southern California IEEE (2005)
  5. Zenghui Liu , Liguo Gua, “Attack simulation and signature extraction of low-rate DoS.”, 3rd International Symposium on Intelligent Information Technology and Security Informatics IEEE 2010 Computer Society (2010)
  6. Y.K. Kwok, R .Tripathi, Y. Chen and H. K. HAWK, “Halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks”, Proc. of the 3rd Int’l Conf. on Networking and MobileComputing (ICCNMC 2005). New York:Springer-Verlag, pp: 423-432 (2005)
  7. Sandeep Sarat and Andreas Terz, “On the Effect of Router Buffer Sizes on Low-Rate Denial of Service Attacks”, IEEE Computer Society (2005)
  8. Amey Shevtekar, Karunakar Anantharam and Nirwan Ansari, “Low Rate TCP Denial-of- Service Attack Detection at Edge Routers”, IEEE COMMUNICATIONS LETTERS,VOL. 9, NO. 4 (2005)
  9. G. Yang, M. Gerla, and M. Y. Sanadidi, “Defense against low rate tcp-targeted denialof-service attacks”, ISCC ’04 Proceedings of the Ninth International Symposium on Computers and Communications 2004 Volume2 (ISCC”04), pages 345–350, Washington, DC, USA. IEEE Computer Society (2004)
  10. Wuhan, Hubei, “Detection of Low-rate DDoS Attack Based on Self-Similarity”, China in 2010 Second International Workshop on Education Technology and Computer Science (March 06-March 07)
  11. Gabriel Macia-Fernandez, Jesus E. Diaz-Verdejo and Pedro García- Teodoro : Evaluation of a low-rate DoS attack against iterative servers : Department of Signal Theory, University of Granada, c/Daniel Saucedo Aranda, s/n, 18071 Granada, Spain (2006)
  12. RFC 793 Transmission Control Protocol.
Index Terms

Computer Science
Information Sciences

Keywords

DoS Attacks Shrew Attacks LDoS Attacks RTO Exploitation Attack Lighweight software.