28,054 research outputs found

    An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic

    Get PDF
    Recently, a serious disturbance for network security could be a Distributed Denial of Service (DDoS) attack. The advent of technological era has also brought along the threat of DDoS attacks for a variety of services and applications that use the Internet. Firms can incur huge financial losses even if there is a disruption in services for a fraction of period. Similar to a DDoS attack is the Flash Crowd (FC) flooding traffics, in which a particular service is assessed by many legitimate users concurrently, which results in the denial of service. Overloading of network resources is a common issue associated with both of these events, which impact CPU, available bandwidth, and memory for legitimate users, thereby leading to limited accessibility. To address this issue, this thesis proposes an adaptive agent-based protection model known as Adaptive Protection of Flooding Attacks (APFA) specific for DDoS attacks and FC flooding traffics. The APFA model is aimed to protect the Network Application Layer (NAL) against such attacks. The APFA model consists of analysis, detection, decision and filter modules. The main contribution of this work in the APFA model is the decision module that employs a software agent to adapt and recognize the DDoS attacks (Demons and Zombies) and FC flooding traffics. The agent is equipped with three analysis functions that operate on three parameters of normal traffic intensity, traffic attack behavior, and IP address history log. The agent accordingly reacts on each of these attacks with different types of filtering actions as required. APFA model was implemented and tested by applying different attack scenarios using CIDDS standard dataset. The APFA model testing results achieve an accuracy of 99.64%, a precision of 99.62% and sensitivity of 99.96%. The APFA model results outperform similar models of the related work and the adaptive agent is able to distinguish between demons and zombies of the DDoS attacks with high accuracy of 99.91%

    A Survey and New Perspectives on Classifying the DDOS Attack with Their Characteristics

    Get PDF
    In network Distributed Denial of Service (DDoS) attacks has been a major threat to the Internet society. The DoS attack produces a large number of client bases due to the enslavement of major users on Web society. In such a DoS attack, the malicious invader targets a system to corrupt its services to the proposed users. These types of attacks are mainly motivated by the existence of different groups of hackers and crackers present on the network. The current research has progressed in this field; researchers have come across many ways through which attacks have been successfully launched. In early days of its origin, the Internet was not planned to face different vulnerable problems, in this aspect networks are need to protect. In this research paper covers the initiation of the DDoS attacks together with their types, and also deliberate certain model scenarios based on flooding based DDoS attacks to compute its impact on valid users and also we classified the different types of DDoS attacks with their environment and tabulated the results

    Real-time cross-layer design for large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks

    Get PDF
    IEEE 802.11 WMN is an emerging next generation low-cost multi-hop wireless broadband provisioning technology. It has the capability of integrating wired and wireless networks such as LANs, IEEE 802.11 WLANs, IEEE 802.16 WMANs, and sensor networks. This kind of integration: large-scale coverage, decentralised and multi-hop architecture, multi-radios, multi-channel assignments, ad hoc connectivity support the maximum freedom of users to join or leave the network from anywhere and at anytime has made the situation far more complex. As a result broadband resources are exposed to various kinds of security attacks, particularly DoS attacks
    • …
    corecore