Abstract

Early detection of Denial of Service (DoS) attacks are given more emphasizing due to its adverse effects on disrupting the services of legitimate users. LDoS attack is one among the DoS category which floods the target at ideal rate to keep the connections open for longer duration. Traditional defense measures are inadequate to filter due to its less traffic volume. The current works focus on either empirical studies or signal processing models to capture the behavioural characteristics of LDoS based on TCP’s congestion control and timeout mechanism but none carries out detection at a faster timestamp. Early detection solutions are the main focus as it could scale up the revenue losses in today’s online application issues. Hence our model is based on Simple Network Management Protocol (SNMP), through which the early detection of LDoS attacks is carried out. The relevant detection metrics are identified through theoretical validation of SNMP MIBs and existing dataset analysis. Experimental simulations illustrate the LDoS detection efficiency and the same has been validated for theoretically.

Highlights

  • Internet plays the vital role due to advanced computing technologies and digitized environment

  • Distributed Denial of Service (DDoS) attack is a critical threat as it makes complete disruptions to the internet community by keeping its traces in the availability feature

  • LDoS attack is one among the category of DDoS family as it makes the TCP sessions engaged for longer duration by sending low spikes of traffic

Read more

Summary

Introduction

Internet plays the vital role due to advanced computing technologies and digitized environment. Distributed Denial of Service (DDoS) attack is a critical threat as it makes complete disruptions to the internet community by keeping its traces in the availability feature. The exhausted victim is unable to accept or respond to any kind of requests from legitimate users Resources exhausted during such attacks include bandwidth of network, CPU cycles, and Server’s memory; interrupt processing capability and protocol structures. LDoS attack is one among the category of DDoS family as it makes the TCP sessions engaged for longer duration by sending low spikes of traffic. LDoS attack exploits the vulnerability in the congestion control mechanism of TCP by either periodically or continuously sending attack requests in short term or at constant rate. If an online service gets disrupted either due to high spike or low spike DDoS, the trust among legitimate users and regular customers will be vanished. The existing solutions are categorized under detection measures in general and detection measures based on hypothesis testing

Technical Backgrounds
Characterization of LDoS Attack
Attack Modelling of TCP Variants
Detection metrics based on Dataset Analysis
Experimental Testbed for LDoS
Traffic Differentiation Based EDGAR Metrics on IP Frequency
Traffic Differentiation based on SNMP Metrics
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call