2019
DOI: 10.1002/cpe.5428
|View full text |Cite
|
Sign up to set email alerts
|

Detection and trace back of low and high volume of distributed denial‐of‐service attack based on statistical measures

Abstract: DDoS attacks are rapidly growing bigger and upsetting online businesses than ever before.During 2012, DDoS attacks were performed on six US banks, viz, Bank of America, JP Morgan Chase, US Bancorp, Citigroup, and PNC Bank. The attacker(s) bombarded their targets with crest traffic of more than 60 gigabits per second. In 2013, Spamhaus, an antispam organization, was the victim for a DDoS attack of 300 gigabits per second. CyberBunker, a Dutch company, outwardly performed this attack on Spamhaus and got blacklis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…Heavy traffics generated using botnets or by distributed systems encounter HVAs. These attacks include the variants of Dos/DDoS attacks [36,[47][48][49], where adversaries either try to overflow the objective services or exploit a vulnerability in the software of the server to exhaust system resources and make it inaccessible for the legitimate users. Techniques of performing these types of attacks can be either traffic-based, bandwidth-based or applicationbased.…”
Section: Case 1: Zero-day High Volume Attacks (Hva)mentioning
confidence: 99%
See 1 more Smart Citation
“…Heavy traffics generated using botnets or by distributed systems encounter HVAs. These attacks include the variants of Dos/DDoS attacks [36,[47][48][49], where adversaries either try to overflow the objective services or exploit a vulnerability in the software of the server to exhaust system resources and make it inaccessible for the legitimate users. Techniques of performing these types of attacks can be either traffic-based, bandwidth-based or applicationbased.…”
Section: Case 1: Zero-day High Volume Attacks (Hva)mentioning
confidence: 99%
“…This phase consists of two modules where module 1 shows the signature generation for high volume attacks (HVA), i.e., variants of DoS/DDoS attack [36,[47][48][49] and module 2 shows the signature generation for low volume attacks (LVA) [56]. LVAs include variants of service scanning, data theft, OS fingerprinting etc.…”
Section: Signature Generation Phasementioning
confidence: 99%
“…LDoS attack flow has a lower average rate than the traditional DoS attack flow, which makes it more insidious and difficult to be detected [21]. LDoS attacks send periodical packet bursts with model as shown in Figure 1 [22].…”
Section: Characteristics Of Ldos Attacksmentioning
confidence: 99%
“…A denial of service (DoS) attack can be described as an explicit attempt to render a server or network incapable of providing normal service to its users. DoS attacks often rely on continuously and excessively consuming limited resources such as bandwidth, memory, storage, and CPU, which are vital to the well‐functioning of the targeted service .…”
Section: Introductionmentioning
confidence: 99%