Skip to main content
Erschienen in:
Buchtitelbild

2014 | OriginalPaper | Buchkapitel

1. An Overview of DDoS Attacks

verfasst von : Shui Yu

Erschienen in: Distributed Denial of Service Attack and Defense

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve the challenges.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat V. D. Gligor, “A note on denial-of-service in operating systems,” IEEE Transactions on Software Engineering, vol. 10, no. 3, pp. 320–324, 1984.CrossRef V. D. Gligor, “A note on denial-of-service in operating systems,” IEEE Transactions on Software Engineering, vol. 10, no. 3, pp. 320–324, 1984.CrossRef
2.
Zurück zum Zitat T. Peng, C. Leckie, and K. Ramamohanarao, “Survey of network-based defense mechanisms countering the dos and ddos problems,” ACM Computing Survey, vol. 39, no. 1, 2007. T. Peng, C. Leckie, and K. Ramamohanarao, “Survey of network-based defense mechanisms countering the dos and ddos problems,” ACM Computing Survey, vol. 39, no. 1, 2007.
3.
Zurück zum Zitat V. L. L. Thing, M. Sloman, and N. Dulay, “A survey of bots used for distributed denial of service attacks,” in Proceedings of the SEC, 2007, pp. 229–240. V. L. L. Thing, M. Sloman, and N. Dulay, “A survey of bots used for distributed denial of service attacks,” in Proceedings of the SEC, 2007, pp. 229–240.
4.
Zurück zum Zitat K. Tsui, “Tutorial - virus (malicious agent),” University of Calgary, Tech. Rep. SENG 609.22, 2001. K. Tsui, “Tutorial - virus (malicious agent),” University of Calgary, Tech. Rep. SENG 609.22, 2001.
5.
Zurück zum Zitat B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, “Your botnet is my botnet: Analysis of a botnet takeover,” in Proceedings of the ACM conference on computer communication security, 2009, pp. 635–647. B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, “Your botnet is my botnet: Analysis of a botnet takeover,” in Proceedings of the ACM conference on computer communication security, 2009, pp. 635–647.
6.
Zurück zum Zitat C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song, “Insights from the inside: A view of botnet management from infiltration,” in Proceedings of USENIX LEET, 2010. C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song, “Insights from the inside: A view of botnet management from infiltration,” in Proceedings of USENIX LEET, 2010.
7.
Zurück zum Zitat M. H. Sqalli, F. Al-Haidari, and K. Salah, “Edos-shield - a two-steps mitigation technique against edos attacks in cloud computing,” in Proceedings of the UCC, 2011, pp. 49–56. M. H. Sqalli, F. Al-Haidari, and K. Salah, “Edos-shield - a two-steps mitigation technique against edos attacks in cloud computing,” in Proceedings of the UCC, 2011, pp. 49–56.
8.
Zurück zum Zitat J. Idziorek, M. Tannian, and D. Jacobson, “The insecurity of cloud utility models,” IT Professional, vol. 15, no. 2, pp. 22–27, 2013.CrossRef J. Idziorek, M. Tannian, and D. Jacobson, “The insecurity of cloud utility models,” IT Professional, vol. 15, no. 2, pp. 22–27, 2013.CrossRef
9.
Zurück zum Zitat R. Lua and K. C. Yow, “Mitigating ddos attacks with transparent and intelligent fast-flux swarm network,” IEEE Network, no. July/August, pp. 28–33, 2011. R. Lua and K. C. Yow, “Mitigating ddos attacks with transparent and intelligent fast-flux swarm network,” IEEE Network, no. July/August, pp. 28–33, 2011.
11.
Zurück zum Zitat P. Erdos and A. Renyi, “On random graphs. i,” Publicationes Mathematicae, vol. 6, pp. 290–297, 1959.MathSciNet P. Erdos and A. Renyi, “On random graphs. i,” Publicationes Mathematicae, vol. 6, pp. 290–297, 1959.MathSciNet
12.
Zurück zum Zitat D. J. Watts and S. H. Strogatz, “Collective dynamics of ‘small-world’ networks,” Nature, vol. 393, no. 6668, pp. 440–442, 1998.CrossRef D. J. Watts and S. H. Strogatz, “Collective dynamics of ‘small-world’ networks,” Nature, vol. 393, no. 6668, pp. 440–442, 1998.CrossRef
13.
Zurück zum Zitat A. L. Barabasi and R. Albert, “Emergence of scaling in random networks,” Science, vol. 286, no. 5439, pp. 509–512, 1999.MathSciNetCrossRef A. L. Barabasi and R. Albert, “Emergence of scaling in random networks,” Science, vol. 286, no. 5439, pp. 509–512, 1999.MathSciNetCrossRef
14.
Zurück zum Zitat R. Albert and A.-L. Barabasi, “Statistical mechanics of complex networks,” Reviews of Modern Physics, vol. 74, pp. 47–97, 2002.MathSciNetCrossRefMATH R. Albert and A.-L. Barabasi, “Statistical mechanics of complex networks,” Reviews of Modern Physics, vol. 74, pp. 47–97, 2002.MathSciNetCrossRefMATH
15.
Zurück zum Zitat L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, “Web caching and zipf-like distributions: Evidence and implications,” in Proceedings of the INFOCOM, 1999, pp. 126–134. L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, “Web caching and zipf-like distributions: Evidence and implications,” in Proceedings of the INFOCOM, 1999, pp. 126–134.
16.
Zurück zum Zitat M. E. Crovella and A. Bestavros, “Self-similarity in world wide web traffic: evidence and possible causes,” IEEE/ACM Transactions on Networking, vol. 5, no. 6, pp. 835–846, 1997.CrossRef M. E. Crovella and A. Bestavros, “Self-similarity in world wide web traffic: evidence and possible causes,” IEEE/ACM Transactions on Networking, vol. 5, no. 6, pp. 835–846, 1997.CrossRef
17.
Zurück zum Zitat M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, “A survey of botnet technology and defenses,” in Proceedings of the cybersecurity applications and technology conference for Homeland security, 2009. M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, “A survey of botnet technology and defenses,” in Proceedings of the cybersecurity applications and technology conference for Homeland security, 2009.
18.
Zurück zum Zitat M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, “My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging,” in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets. USENIX Association, 2007. M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, “My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging,” in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets. USENIX Association, 2007.
19.
Zurück zum Zitat N. Ianelli and A. Hackworth, “Botnets as vehicle for online crime,” in Proceedings of the 18th Annual FIRST Conference, 2006. N. Ianelli and A. Hackworth, “Botnets as vehicle for online crime,” in Proceedings of the 18th Annual FIRST Conference, 2006.
20.
Zurück zum Zitat R. Perdisci, I. Corona, D. Dagon, and W. Lee, “Detecting malicious flux service networks through passive analysis of recursive dns traces,” in Proceedings of the Computer Security Applications Conference, 2009, pp. 311–320. R. Perdisci, I. Corona, D. Dagon, and W. Lee, “Detecting malicious flux service networks through passive analysis of recursive dns traces,” in Proceedings of the Computer Security Applications Conference, 2009, pp. 311–320.
21.
Zurück zum Zitat N. Jiang, J. Cao, Y. Jin, L. Li, and Z.-L. Zhang, “Identifying suspicious activities through dns failure graph analysis,” in Proceedings of Network Protocols (ICNP), oct. 2010, pp. 144–153. N. Jiang, J. Cao, Y. Jin, L. Li, and Z.-L. Zhang, “Identifying suspicious activities through dns failure graph analysis,” in Proceedings of Network Protocols (ICNP), oct. 2010, pp. 144–153.
22.
Zurück zum Zitat D. K. McGrath and M. Gupta, “Behind phishing: An examination of phisher modi operandi,” in Proceedings of the LEET, 2008. D. K. McGrath and M. Gupta, “Behind phishing: An examination of phisher modi operandi,” in Proceedings of the LEET, 2008.
23.
Zurück zum Zitat J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, “Beyond blacklists: learning to detect malicious web sites from suspicious urls,” in Proceedings of the ACM SIGKDD. ACM, 2009, pp. 1245–1254. J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, “Beyond blacklists: learning to detect malicious web sites from suspicious urls,” in Proceedings of the ACM SIGKDD. ACM, 2009, pp. 1245–1254.
24.
Zurück zum Zitat Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov, “Spamming botnets: signatures and characteristics,” in Proceedings of the SIGCOMM, 2008, pp. 171–182. Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov, “Spamming botnets: signatures and characteristics,” in Proceedings of the SIGCOMM, 2008, pp. 171–182.
25.
Zurück zum Zitat G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, “BotHunter: Detecting malware infection through ids-driven dialog correlation,” in Proceedings of the 16th USENIX Security Symposium, August 2007. G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, “BotHunter: Detecting malware infection through ids-driven dialog correlation,” in Proceedings of the 16th USENIX Security Symposium, August 2007.
26.
Zurück zum Zitat G. Gu, R. Perdisci, J. Zhang, and W. Lee, “BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection,” in Proceedings of the 17th USENIX Security Symposium, 2008. G. Gu, R. Perdisci, J. Zhang, and W. Lee, “BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection,” in Proceedings of the 17th USENIX Security Symposium, 2008.
27.
Zurück zum Zitat D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, “Inferring internet denial-of-service activity,” ACM Transactions on Computer Systems, vol. 24, no. 2, pp. 115–139, 2006.CrossRef D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, “Inferring internet denial-of-service activity,” ACM Transactions on Computer Systems, vol. 24, no. 2, pp. 115–139, 2006.CrossRef
30.
Zurück zum Zitat W. Yu, X. Wang, X. Fu, D. Xuan, and W. Zhao, “An invisible localization attack to internet threat monitors,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 11, pp. 1611–1625, 2009.CrossRef W. Yu, X. Wang, X. Fu, D. Xuan, and W. Zhao, “An invisible localization attack to internet threat monitors,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 11, pp. 1611–1625, 2009.CrossRef
31.
Zurück zum Zitat L. Huang, X. Nguyen, M. N. Garofalakis, J. M. Hellerstein, M. I. Jordan, A. D. Joseph, and N. Taft, “Communication-efficient online detection of network-wide anomalies,” in Proceedings of the INFOCOM, 2007, pp. 134–142. L. Huang, X. Nguyen, M. N. Garofalakis, J. M. Hellerstein, M. I. Jordan, A. D. Joseph, and N. Taft, “Communication-efficient online detection of network-wide anomalies,” in Proceedings of the INFOCOM, 2007, pp. 134–142.
32.
Zurück zum Zitat Y. Tsaig and D. L. Donoho, “Compressed sensing,” IEEE Transactions on Information Theory, vol. 52, pp. 1289–1306, 2006.CrossRef Y. Tsaig and D. L. Donoho, “Compressed sensing,” IEEE Transactions on Information Theory, vol. 52, pp. 1289–1306, 2006.CrossRef
33.
Zurück zum Zitat S. Yu, W. Zhou, and R. Doss, “Information theory based detection against network behavior mimicking ddos attack,” IEEE Communications Letters, vol. 12, no. 4, pp. 319–321, 2008. S. Yu, W. Zhou, and R. Doss, “Information theory based detection against network behavior mimicking ddos attack,” IEEE Communications Letters, vol. 12, no. 4, pp. 319–321, 2008.
34.
Zurück zum Zitat S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang, “Discriminating ddos attacks from flash crowds using flow correlation coefficient,” IEEE Transactions on Parallel Distributed Systems, vol. 23, no. 6, pp. 1073–1080, 2012.CrossRef S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang, “Discriminating ddos attacks from flash crowds using flow correlation coefficient,” IEEE Transactions on Parallel Distributed Systems, vol. 23, no. 6, pp. 1073–1080, 2012.CrossRef
35.
Zurück zum Zitat R. Duda, P. Hart, and D. Stork, Unsupervised learning and clustering. Wiley, 2001. R. Duda, P. Hart, and D. Stork, Unsupervised learning and clustering. Wiley, 2001.
36.
Zurück zum Zitat P. Van Mieghem, Graph Spectra for Complex Networks. Cambridge press, 2011. P. Van Mieghem, Graph Spectra for Complex Networks. Cambridge press, 2011.
37.
Zurück zum Zitat H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, “Sybilguard: defending against sybil attacks via social networks,” IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 576–589, 2008.CrossRef H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, “Sybilguard: defending against sybil attacks via social networks,” IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 576–589, 2008.CrossRef
38.
Zurück zum Zitat H. Yu, C. Shi, M. Kaminsky, P. B. Gibbons, and F. Xiao, “Dsybil: Optimal sybil-resistance for recommendation systems,” in IEEE Symposium on Security and Privacy, 2009, pp. 283–298. H. Yu, C. Shi, M. Kaminsky, P. B. Gibbons, and F. Xiao, “Dsybil: Optimal sybil-resistance for recommendation systems,” in IEEE Symposium on Security and Privacy, 2009, pp. 283–298.
39.
Zurück zum Zitat Z. Yang, C. Wilson, X. Wang, B. Y. Zhao, and Y. Dai, “Uncovering social nework sybils in the wild,” in Internet Measurement Conference, 2011. Z. Yang, C. Wilson, X. Wang, B. Y. Zhao, and Y. Dai, “Uncovering social nework sybils in the wild,” in Internet Measurement Conference, 2011.
40.
Zurück zum Zitat K. Claffy, T. Monk, and D. McRobb, “Internet tomography,” Nature, Jan 1999. K. Claffy, T. Monk, and D. McRobb, “Internet tomography,” Nature, Jan 1999.
41.
Zurück zum Zitat M. Coates, A. Hero, R. Nowak, and B. Yu, “Internet tomography,” IEEE Signal Processing Magazine, vol. 19, pp. 47–65, 2002.CrossRef M. Coates, A. Hero, R. Nowak, and B. Yu, “Internet tomography,” IEEE Signal Processing Magazine, vol. 19, pp. 47–65, 2002.CrossRef
42.
Zurück zum Zitat D. Dagon, C. Zou, and W. Lee, “Modeling botnet propagation using time zones,” in Proceedings of the 13th Network and Distributed System Security Symposium NDSS, 2006. D. Dagon, C. Zou, and W. Lee, “Modeling botnet propagation using time zones,” in Proceedings of the 13th Network and Distributed System Security Symposium NDSS, 2006.
43.
Zurück zum Zitat P. De, Y. Liu, and S. K. Das, “An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 8, no. 3, pp. 413–425, 2009.CrossRef P. De, Y. Liu, and S. K. Das, “An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 8, no. 3, pp. 413–425, 2009.CrossRef
44.
Zurück zum Zitat C. C. Zou, W. Gong, D. F. Towsley, and L. Gao, “The monitoring and early detection of internet worms,” IEEE/ACM Transactions on Networking, vol. 13, no. 5, pp. 961–974, 2005.CrossRef C. C. Zou, W. Gong, D. F. Towsley, and L. Gao, “The monitoring and early detection of internet worms,” IEEE/ACM Transactions on Networking, vol. 13, no. 5, pp. 961–974, 2005.CrossRef
45.
Zurück zum Zitat Z. Chen and C. Ji, “An information-theoretic view of network-aware malware attacks,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 530–541, 2009.CrossRef Z. Chen and C. Ji, “An information-theoretic view of network-aware malware attacks,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 530–541, 2009.CrossRef
46.
Zurück zum Zitat P. V. Mieghem, J. Omic, and R. E. Kooij, “Virus spread in networks,” IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 1–14, 2009.CrossRef P. V. Mieghem, J. Omic, and R. E. Kooij, “Virus spread in networks,” IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 1–14, 2009.CrossRef
47.
Zurück zum Zitat W. Yu and K. J. R. Liu, “Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring: A game-theoretic approach,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 317–330, 2008.CrossRef W. Yu and K. J. R. Liu, “Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring: A game-theoretic approach,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 317–330, 2008.CrossRef
48.
Zurück zum Zitat C. C. Yang, “Information sharing and privacy protection of terrorist or criminal social networks,” IEEE International Conference on Intelligence and Security Informatics, pp. 40–45, 2008. C. C. Yang, “Information sharing and privacy protection of terrorist or criminal social networks,” IEEE International Conference on Intelligence and Security Informatics, pp. 40–45, 2008.
49.
Zurück zum Zitat A. Belenky and N. Ansari, “Ip traceback with deterministic packet marking,” IEEE Communications Letters, vol. 7, pp. 162–164, 2003.CrossRef A. Belenky and N. Ansari, “Ip traceback with deterministic packet marking,” IEEE Communications Letters, vol. 7, pp. 162–164, 2003.CrossRef
50.
Zurück zum Zitat D. Dean, M. Franklin, and A. Stubblefield, “An algebraic approach to ip traceback,” in ACM Transactions on Information and System Security, 2001, pp. 3–12. D. Dean, M. Franklin, and A. Stubblefield, “An algebraic approach to ip traceback,” in ACM Transactions on Information and System Security, 2001, pp. 3–12.
51.
Zurück zum Zitat Y. Xiang, W. Zhou, and M. Guo, “Flexible deterministic packet marking: An ip traceback system to find the real source of attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 4, pp. 567–580, 2009.CrossRef Y. Xiang, W. Zhou, and M. Guo, “Flexible deterministic packet marking: An ip traceback system to find the real source of attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 4, pp. 567–580, 2009.CrossRef
52.
Zurück zum Zitat B. Al-Duwairi and G. Manimaran, “Novel hybrid schemes employing packet marking and logging for ip traceback,” IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 5, pp. 403–418, 2006.CrossRef B. Al-Duwairi and G. Manimaran, “Novel hybrid schemes employing packet marking and logging for ip traceback,” IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 5, pp. 403–418, 2006.CrossRef
53.
Zurück zum Zitat M. T. Goodrich, “Probabilistic packet marking for large-scale ip traceback,” IEEE/ACM Transactions on Networking, vol. 16, no. 1, pp. 15–24, 2008.CrossRef M. T. Goodrich, “Probabilistic packet marking for large-scale ip traceback,” IEEE/ACM Transactions on Networking, vol. 16, no. 1, pp. 15–24, 2008.CrossRef
54.
Zurück zum Zitat S. Yu, W. Zhou, R. Doss, and W. Jia, “Traceback of ddos attacks using entropy variations,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 3, pp. 412–425, 2011.CrossRef S. Yu, W. Zhou, R. Doss, and W. Jia, “Traceback of ddos attacks using entropy variations,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 3, pp. 412–425, 2011.CrossRef
Metadaten
Titel
An Overview of DDoS Attacks
verfasst von
Shui Yu
Copyright-Jahr
2014
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-9491-1_1

Premium Partner