Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014) 2014
DOI: 10.1109/iri.2014.7051881
|View full text |Cite
|
Sign up to set email alerts
|

DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring

Abstract: The success in detecting Distributed Denial of Service (DDoS) flooding attacks is highly dependent on the quality and quantity of the covered flows by the traffic monitoring mechanism that is employed in any DDoS defense mechanism. In this paper, we propose DiCoTraM, a DDoS flooding attack tailored distributed and coordinated traffic monitoring mechanism that centrally and periodically coordinates the monitoring responsibilities and distributes them among all the monitoring devices within each autonomous syste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 22 publications
(26 reference statements)
0
4
0
Order By: Relevance
“…Therefore, the eNodeB 2 can effectively verify the validity of the authentication request, decide whether to perform a check operation and prevent from denial-of-service attacks. Moreover, the traffic detection methods can defend against the denial-of-service attacks which occupy channel resources [19,20]. It will not be described further in this paper.…”
Section: Mechanism Analysis 41 Security Analysismentioning
confidence: 99%
“…Therefore, the eNodeB 2 can effectively verify the validity of the authentication request, decide whether to perform a check operation and prevent from denial-of-service attacks. Moreover, the traffic detection methods can defend against the denial-of-service attacks which occupy channel resources [19,20]. It will not be described further in this paper.…”
Section: Mechanism Analysis 41 Security Analysismentioning
confidence: 99%
“…There are two main groups of sampling methods: packet sampling and flow sampling [28,29]. The packet sampling method, applied to packets before generating flows, is improved in [30], which proposes an adaptive packet sampling method to provide accurate measurements of network traffic.…”
Section: Introductionmentioning
confidence: 99%
“…In terms of preserving the characteristics of flow traffic, it has been shown that flow sampling, applied to flows, is more efficient than packet-based sampling [29,31]. However, the required memory and CPU power is greater [26,28].…”
Section: Introductionmentioning
confidence: 99%
“…Flow-based anomaly detection methods for high-speed networks mostly use sampled traffic. Two sampling methods, packet sampling and flow sampling, are widely investigated [21,22]. Packet sampling is performed at routers before flows are generated but flow sampling is applied to flows at NetFlow collectors [23].…”
Section: Introductionmentioning
confidence: 99%