4 research outputs found
Flooding Distributed Denial of Service Attacks-A Review
Flaws either in users’ implementation of a network or in the standard
specification of protocols has resulted in gaps that allow various kinds of network attack to be
launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe
impact. Approach: This study reviews recent researches on flood attacks and their mitigation,
classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared
against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood
attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities
that are the methods used are flooding and the main purpose is to achieve denial of service to the
target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must
correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution
Flooding Distributed Denial of Service Attacks-A Review
Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution
Intrusion detection based on behavioral rules for the bytes of the headers of the data units in IP networks
Nowadays, communications through computer networks are of utmost importance for the normal functioning of organizations, worldwide transactions and content delivery. These networks are threatened by all kinds of attacks, leading to traffic anomalies that will eventually disrupt the normal behaviour of the networks, exploring specific breaches on a system component or exhausting network resources. Automatic detection of these network anomalies comprises one of the most important resources for network administration, and Intrusion Detection Systems(IDSs) are amongst the systems responsible for this automatic detection.
This dissertation starts from the assumption that it is possible to use machine learning to, consistently and automatically, produce rules for an intrusion detector based on statistics for the first 64 bytes of the headers of Internet Protocol (IP) packets. The survey on the state of the art on related works and currently available IDSs shows that the specific approach taken here is worth to be explored. The decision tree learning algorithm known as C4.5 is identified as a
suitable means to produce the aforementioned rules, due to the similarity between their syntax and the tree structure.
Several rules are then devised using the ML approach for several attacks. The attacks were the same used in a previous work, in which the rules were devised manually. Both rule sets are then compared to show that, in fact, it is possible to construct rules using the approach taken herein, and that the rules created resorting to the C4.5 algorithm are superior to the ones devised after thorough human analysis of several statistics calculated for the bytes of the headers of the packets. To compare them, each rule set was used to detect intrusions in third party traces containing attacks and in live traffic during simulation of attacks. Most of the attacks producing noticeable impact on the headers were detected by both rule sets, but the results for the third party traces were better in the case of the ML devised rules, providing a clear evidence for the
aforementioned assumptions.Hoje em dia, as comunicações através de redes informáticas são da maior importância para o
normal funcionamento das organizações, transações mundiais e entrega de conteúdos. Essas
redes são ameaçadas por todo o tipo de ataques, levando a anomalias no tráfego, que eventualmente vão corromper o normal funcionamento da rede, explorando falhas específicas num
componente de um sistema, ou esgotando os recursos de rede. A deteção automática dessas
anomalias de rede é um dos recursos mais importantes para os administradores de rede, e os
Sistemas de Deteção de Intrusões estão entre os sistemas responsáveis por essa deteção.
Esta dissertação tem como ponto de partida, a assunção que é possível usar mecanismos de
aprendizagem automática para produzir, de modo consistente e automático, regras para a deteção de intrusões, baseadas em estatísticas dos primeiros 64 bytes dos cabeçalhos dos pacotes
IP. O estudo sobre o estado da arte em trabalhos da área, e em sistemas de deteção atualmente
disponíveis, mostrou que o método usado nesta dissertação merece ser estudado. O algoritmo
de árvores de decisão C4.5 foi identificado como um meio apropriado para produzir as regras
já referidas, devido à semelhança entre a sintaxe das mesmas e a estrutura em árvore deste
algoritmo.
Várias regras foram depois produzidas para vários tipos de ataque, usando a abordagem por
aprendizagem automática. Os ataques tomados em consideração foram os mesmos que foram
utilizados num trabalho anterior, em que a regras foram concebidas manualmente. Ambos os
conjuntos de regras são depois comparados, para mostrar que, de facto, é possível construir regras através da abordagem utilizada nesta dissertação, e que as regras criadas através do algoritmo C4.5 são superiores às que foram criadas através de análise humana das várias estatísticas
calculadas para os bytes dos cabeçalhos dos pacotes. Para as comparar, cada conjunto de regras foi utilizado para detetar intrusões em registos de tráfego disponíveis na Internet contendo
ataques e em tráfego em tempo real, durante a simulação de ataques. A maioria dos ataques
que produz um forte impacto nos cabeçalhos dos pacotes foi detetado por ambos os conjuntos,
mas os resultados com os registos retirados da Internet foram melhores para as regras produzidas
por aprendizagem automática, dando uma prova clara para o que foi previamente assumido
DDoS detection based on traffic self-similarity
Distributed denial of service attacks (or DDoS) are a common occurrence on the internet and are becoming more intense as
the bot-nets, used to launch them, grow bigger. Preventing or stopping DDoS is not possible without radically changing the
internet infrastructure; various DDoS mitigation techniques have been devised with different degrees of success. All mitigation
techniques share the need for a DDoS detection mechanism.
DDoS detection based on traffic self-similarity estimation is a relatively new approach which is built on the notion that undis-
turbed network traffic displays fractal like properties. These fractal like properties are known to degrade in presence of abnormal
traffic conditions like DDoS. Detection is possible by observing the changes in the level of self-similarity in the traffic flow at the
target of the attack.
Existing literature assumes that DDoS traffic lacks the self-similar properties of undisturbed traffic. We show how existing bot-
nets could be used to generate a self-similar traffic flow and thus break such assumptions. We then study the implications of
self-similar attack traffic on DDoS detection.
We find that, even when DDoS traffic is self-similar, detection is still possible. We also find that the traffic flow resulting from the
superimposition of DDoS flow and legitimate traffic flow possesses a level of self-similarity that depends non-linearly on both
relative traffic intensity and on the difference in self-similarity between the two incoming flows