11 research outputs found
On Application Layer DDoS Attack Detection in High-Speed Encrypted Networks
Application-layer denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed by using legitimate requests from legitimately connected network machines which makes these attacks undetectable for signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer making it even harder to detect attacker’s activity without decrypting users network traffic and violating their privacy. In this paper, we present a method which allows us to timely detect various applicationlayer attacks against a computer network. We focus on detection of the attacks that utilize encrypted protocols by applying an anomaly-detection-based approach to statistics extracted from network packets. Since network traffic decryption can violate ethical norms and regulations on privacy, the detection method proposed analyzes network traffic without decryption. The method involves construction of a model of normal user behavior by analyzing conversations between a server and clients. The algorithm is self-adaptive and allows one to update the model every time when a new portion of network traffic data is available. Once the model has been built, it can be applied to detect various types of application-layer denial-of- service attacks. The proposed technique is evaluated with realistic end user network traffic generated in our virtual network environment. Evaluation results show that these attacks can be properly detected, while the number of false alarms remains very low
The Dynamics of Internet Traffic: Self-Similarity, Self-Organization, and Complex Phenomena
The Internet is the most complex system ever created in human history.
Therefore, its dynamics and traffic unsurprisingly take on a rich variety of
complex dynamics, self-organization, and other phenomena that have been
researched for years. This paper is a review of the complex dynamics of
Internet traffic. Departing from normal treatises, we will take a view from
both the network engineering and physics perspectives showing the strengths and
weaknesses as well as insights of both. In addition, many less covered
phenomena such as traffic oscillations, large-scale effects of worm traffic,
and comparisons of the Internet and biological models will be covered.Comment: 63 pages, 7 figures, 7 tables, submitted to Advances in Complex
System
Defensa proactiva y reactiva ante ataques DDoS en un entorno simulado de redes definidas por software
Las redes definidas por software (Software Defined Networking, SDN) presentan un cambio de paradigma para las redes de comunicaciones debido a la separación del plano de control y de datos, que abstrae el elemento \textit{hardware} del elemento software y dispone de un elemento central (controlador) que gestiona la red de manera centralizada. Es una arquitectura de red flexible, gestionable, adaptativa y económica, siendo ideal para soportar cualquier aplicación que se desarrolle hoy en dÃa. Este controlador, de hecho, proporciona al sistema una capa de abstracción que facilita la creación de nuevos servicios de red y aplicaciones. En este trabajo se ha seleccionado el controlador OpenDayLight por su popularidad y sus caracterÃsticas, tras analizar varios controladores de código abierto. Paralelamente a este cambio de paradigma, los ataques orientados a Internet, y especialmente los ataques de denegación de servicio (Distributed Denial of Service, DDoS), siguen sucediéndose. Los ataques DDoS tratan de agotar los recursos del sistema consumiendo el ancho de banda. En este Trabajo de Fin de Grado, se han estudiado los diferentes tipos de ataques DDoS, centrándose posteriormente en uno de los más comunes, \textit{flooding} sobre el protocolo HTTP. Tomando en consideración estos aspectos, en este TFG se ha desarrollado un mecanismo de defensa proactiva, que rejuvenece las replicas periódicamente, independientemente del estado en que se encuentren, y reactiva, que actúa cuando se produce la detección de una amenaza, ante ataques DDOS sobre un controlador de SDN en un entorno de red simulado (concretamente, por Mininet). El escenario de trabajo propuesto supone un servidor web que se encuentra distribuido en distintos nodos (gracias al uso de SDN), de modo que ante un ataque DDoS tolera la indisponibilidad de ciertos nodos. De este modo, se pretende mostrar una idea del funcionamiento de redes SDN en un entorno real y su potencial para contrarrestar ataques DDoS asegurando la calidad de servicio. Por último, se han realizado pruebas experimentales para demostrar su funcionamiento ante diferentes escenarios de ataque. Los resultados muestran que la defensa propuesta proporciona una capa de seguridad adicional al sistema que es capaz de mitigar los ataques DDoS. El código desarrollado se ha liberado para su utilización y para garantizar la reproducibilidad de los resultados obtenidos
Protecting web servers from distributed denial of service attack
This thesis developed a novel architecture and adaptive methods to detect and block Distributed Denial of Service attacks with minimal punishment to legitimate users. A real time scoring algorithm differentiated attackers from legitimate users. This architecture reduces the power consumption of a web server farm thus reducing the carbon footprint
Recommended from our members
Analytical Modelling of Scheduling Schemes under Self-similar Network Traffic. Traffic Modelling and Performance Analysis of Centralized and Distributed Scheduling Schemes.
High-speed transmission over contemporary communication networks has
drawn many research efforts. Traffic scheduling schemes which play a critical role in
managing network transmission have been pervasively studied and widely
implemented in various practical communication networks. In a sophisticated
communication system, a variety of applications co-exist and require differentiated
Quality-of-Service (QoS). Innovative scheduling schemes and hybrid scheduling
disciplines which integrate multiple traditional scheduling mechanisms have
emerged for QoS differentiation. This study aims to develop novel analytical models
for commonly interested scheduling schemes in communication systems under more
realistic network traffic and use the models to investigate the issues of design and
development of traffic scheduling schemes.
In the open literature, it is commonly recognized that network traffic exhibits
self-similar nature, which has serious impact on the performance of communication
networks and protocols. To have a deep study of self-similar traffic, the real-world
traffic datasets are measured and evaluated in this study. The results reveal that selfsimilar
traffic is a ubiquitous phenomenon in high-speed communication networks
and highlight the importance of the developed analytical models under self-similar
traffic.
The original analytical models are then developed for the centralized
scheduling schemes including the Deficit Round Robin, the hybrid PQGPS which
integrates the traditional Priority Queueing (PQ) and Generalized Processor Sharing (GPS) schemes, and the Automatic Repeat reQuest (ARQ) forward error control
discipline in the presence of self-similar traffic.
Most recently, research on the innovative Cognitive Radio (CR) techniques
in wireless networks is popular. However, most of the existing analytical models still
employ the traditional Poisson traffic to examine the performance of CR involved
systems. In addition, few studies have been reported for estimating the residual
service left by primary users. Instead, extensive existing studies use an ON/OFF
source to model the residual service regardless of the primary traffic. In this thesis, a PQ theory is adopted to investigate and model the possible service left by selfsimilar
primary traffic and derive the queue length distribution of individual
secondary users under the distributed spectrum random access protocol
Recommended from our members
A novel intrusion detection system (IDS) architecture. Attack detection based on snort for multistage attack scenarios in a multi-cores environment.
Recent research has indicated that although security systems are developing,
illegal intrusion to computers is on the rise. The research conducted here
illustrates that improving intrusion detection and prevention methods is
fundamental for improving the overall security of systems.
This research includes the design of a novel Intrusion Detection System (IDS)
which identifies four levels of visibility of attacks. Two major areas of security
concern were identified: speed and volume of attacks; and complexity of
multistage attacks. Hence, the Multistage Intrusion Detection and Prevention
System (MIDaPS) that is designed here is made of two fundamental elements:
a multistage attack engine that heavily depends on attack trees and a Denial of
Service Engine. MIDaPS were tested and found to improve current intrusion
detection and processing performances.
After an intensive literature review, over 25 GB of data was collected on
honeynets. This was then used to analyse the complexity of attacks in a series
of experiments. Statistical and analytic methods were used to design the novel
MIDaPS.
Key findings indicate that an attack needs to be protected at 4 different levels.
Hence, MIDaPS is built with 4 levels of protection. As, recent attack vectors use
legitimate actions, MIDaPS uses a novel approach of attack trees to trace the
attacker¿s actions. MIDaPS was tested and results suggest an improvement to
current system performance by 84% whilst detecting DDOS attacks within 10
minutes
DDoS Capability and Readiness - Evidence from Australian Organisations
A common perception of cyber defence is that it should protect systems and data from malicious attacks, ideally keeping attackers outside of secure perimeters and preventing entry. Much of the effort in traditional cyber security defence is focused on removing gaps in security design and preventing those with legitimate permissions from becoming a gateway or resource for those seeking illegitimate access. By contrast, Distributed Denial of Service (DDoS) attacks do not use application backdoors or software vulnerabilities to create their impact. They instead utilise legitimate entry points and knowledge of system processes for illegitimate purposes. DDoS seeks to overwhelm system and infrastructure resources so that legitimate requests are prevented from reaching their intended destination. For this thesis, a literature review was performed using sources from two perspectives. Reviews of both industry literature and academic literature were combined to build a balanced view of knowledge of this area. Industry and academic literature revealed that DDoS is outpacing internet growth, with vandalism, criminal and ideological motivations rising to prominence. From a defence perspective, the human factor remains a weak link in cyber security due to proneness for mistakes, oversights and the variance in approach and methods expressed by differing cultures. How cyber security is perceived, approached, and applied can have a critical effect on the overall outcome achieved, even when similar technologies are implemented. In addition, variance in the technical capabilities of those responsible for the implementation may create further gaps and vulnerabilities. While discussing technical challenges and theoretical concepts, existing literature failed to cover the experiences held by the victim organisations, or the thoughts and feelings of their personnel. This thesis addresses these identified gaps through exploratory research, which used a mix of descriptive and qualitative analysis to develop results and conclusions. The websites of 60 Australian organisations were analysed to uncover the level and quality of cyber security information they were willing to share and the methods and processes they used to engage with their audience. In addition, semi-structured interviews were conducted with 30 employees from around half of those websites analysed. These were analysed using NVivo12 qualitative analysis software. The difficulty experienced with attracting willing participants reflected the comfort that organisations showed with sharing cyber security information and experiences. However, themes found within the results show that, while DDoS is considered a valid threat, without encouragement to collaborate and standardise minimum security levels, firms may be missing out on valuable strategies to improve their cyber security postures. Further, this reluctance to share leads organisations to rely on their own internal skill and expertise, thus failing to realise the benefits of established frameworks and increased diversity in the workforce. Along with the size of the participant pool, other limitations included the diversity of participants and the impact of COVID-19 which may have influenced participants' thoughts and reflections. These limitations however, present opportunity for future studies using greater participant numbers or a narrower target focus. Either option would be beneficial to the recommendations of this study which were made from a practical, social, theoretical and policy perspective. On a practical and social level, organisational capabilities suffer due to the lack of information sharing and this extends to the community when similar restrictions prevent collaboration. Sharing of knowledge and experiences while protecting sensitive information is a worthy goal and this is something that can lead to improved defence. However, while improved understanding is one way to reduce the impact of cyber-attacks, the introduction of minimum cyber security standards for products, could reduce the ease at which devices can be used to facilitate attacks, but only if policy and effective governance ensures product compliance with legislation. One positive side to COVID-19's push to remote working, was an increase in digital literacy. As more roles were temporarily removed from their traditional physical workplace, many employees needed to rapidly accelerate their digital competency to continue their employment. To assist this transition, organisations acted to implement technology solutions that eased the ability for these roles to be undertaken remotely and as a consequence, they opened up these roles to a greater pool of available candidates. Many of these roles are no longer limited to the geographical location of potential employees or traditional hours of availability. Many of these roles could be accessed from almost anywhere, at any time, which had a positive effect on organisational capability and digital sustainability