4 research outputs found

    Contribuciones para la Detecci贸n de Ataques Distribuidos de Denegaci贸n de Servicio (DDoS) en la Capa de Aplicaci贸n

    Get PDF
    Se analizaron seis aspectos sobre la detecci贸n de ataques DDoS: t茅cnicas, variables, herramientas, ubicaci贸n de implementaci贸n, punto en el tiempo y precisi贸n de detecci贸n. Este an谩lisis permiti贸 realizar una contribuci贸n 煤til al dise帽o de una estrategia adecuada para neutralizar estos ataques. En los 煤ltimos a帽os, estos ataques se han dirigido hacia la capa de aplicaci贸n. Este fen贸meno se debe principalmente a la gran cantidad de herramientas para la generaci贸n de este tipo de ataque. Por ello, adem谩s, en este trabajo se propone una alternativa de detecci贸n basada en el dinamismo del usuario web. Para esto, se evaluaron las caracter铆sticas del dinamismo del usuario extra铆das de las funciones del mouse y del teclado. Finalmente, el presente trabajo propone un enfoque de detecci贸n de bajo costo que consta de dos pasos: primero, las caracter铆sticas del usuario se extraen en tiempo real mientras se navega por la aplicaci贸n web; en segundo lugar, cada caracter铆stica extra铆da es utilizada por un algoritmo de orden (O1) para diferenciar a un usuario real de un ataque DDoS. Los resultados de las pruebas con las herramientas de ataque LOIC, OWASP y GoldenEye muestran que el m茅todo propuesto tiene una eficacia de detecci贸n del 100% y que las caracter铆sticas del dinamismo del usuario de la web permiten diferenciar entre un usuario real y un robot

    Towards Coordinated, Network-Wide Traffic Monitoring for Early Detection of DDoS Flooding Attacks

    Get PDF
    DDoS flooding attacks are one of the biggest concerns for security professionals and they are typically explicit attempts to disrupt legitimate users' access to services. Developing a comprehensive defense mechanism against such attacks requires a comprehensive understanding of the problem and the techniques that have been used thus far in preventing, detecting, and responding to various such attacks. In this thesis, we dig into the problem of DDoS flooding attacks from four directions: (1) We study the origin of these attacks, their variations, and various existing defense mechanisms against them. Our literature review gives insight into a list of key required features for the next generation of DDoS flooding defense mechanisms. The most important requirement on this list is to see more distributed DDoS flooding defense mechanisms in near future, (2) In such systems, the success in detecting DDoS flooding attacks earlier and in a distributed fashion is highly dependent on the quality and quantity of the traffic flows that are covered by the employed traffic monitoring mechanisms. This motivates us to study and understand the challenges of existing traffic monitoring mechanisms, (3) We propose a novel distributed, coordinated, network-wide traffic monitoring (DiCoTraM) approach that addresses the key challenges of current traffic monitoring mechanisms. DiCoTraM enhances flow coverage to enable effective, early detection of DDoS flooding attacks. We compare and evaluate the performance of DiCoTraM with various other traffic monitoring mechanisms in terms of their total flow coverage and DDoS flooding attack flow coverage, and (4) We evaluate the effectiveness of DiCoTraM with cSamp, an existing traffic monitoring mechanism that outperforms most of other traffic monitoring mechanisms, with regards to supporting early detection of DDoS flooding attacks (i.e., at the intermediate network) by employing two existing DDoS flooding detection mechanisms over them. We then compare the effectiveness of DiCoTraM with that of cSamp by comparing the detection rates and false positive rates achieved when the selected detection mechanisms are employed over DiCoTraM and cSamp. The results show that DiCoTraM outperforms other traffic monitoring mechanisms in terms of DDoS flooding attack flow coverage
    corecore