Skip to main content
Top

2011 | OriginalPaper | Chapter

2. Background

Authors : A. B. Tickle, E. Ahmed, S. M. Bhaskar, G. Mohay, S. Panichprecha, S. V. Raghavan, B. Ravindran, D. Schmidt, S. Suriadi

Published in: An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In Chap.​ 1, we have introduced the serious consequences that a Denial of Service (DoS) attack could pose on our society which is increasingly reliant on information and the systems used to store, process, and communicate that information. However, the DoS problem has various dimensions and definitions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Readers who are interested in the details of the taxonomy of DDoS should refer to the paper by Mirkovic and Reiher [44].
 
Literature
2.
go back to reference Arce, I., and E. Levy. 2003. An analysis of the slapper worm. IEEE Security & Privacy 1(1): 82–87.CrossRef Arce, I., and E. Levy. 2003. An analysis of the slapper worm. IEEE Security & Privacy 1(1): 82–87.CrossRef
5.
go back to reference Barford, P., and V. Yegneswaran. 2006. An inside look at botnets. Malware detection, eds. In M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, Advances in Information Security, 171–191. Berlin: Springer Science+Business Media, LLC. Barford, P., and V. Yegneswaran. 2006. An inside look at botnets. Malware detection, eds. In M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, Advances in Information Security, 171–191. Berlin: Springer Science+Business Media, LLC.
9.
go back to reference Bryan-Low, C. 2007. How legal codes can hinder hacker cases. The Wall Street Journal. Jan 17, p. A8. Bryan-Low, C. 2007. How legal codes can hinder hacker cases. The Wall Street Journal. Jan 17, p. A8.
14.
go back to reference Cheswick, W.R., and S.M. Bellovin. 1994. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Professional. Cheswick, W.R., and S.M. Bellovin. 1994. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Professional.
15.
go back to reference CPNI. 2008. Advice on the sockstress vulnerabilities (FICORA 193744). Advisory, Centre for the Protection of National Infrastructure. CPNI. 2008. Advice on the sockstress vulnerabilities (FICORA 193744). Advisory, Centre for the Protection of National Infrastructure.
20.
go back to reference Garber, L. 2000. Denial-of-service attacks rip the internet. Computer 33(4): 12–17.CrossRef Garber, L. 2000. Denial-of-service attacks rip the internet. Computer 33(4): 12–17.CrossRef
25.
go back to reference Hund, R., M. Hamann, and T. Holz. 2008. Towards next-generation botnets. In European Conference on Computer Network Defense. EC2ND 2008, 33–40. Hund, R., M. Hamann, and T. Holz. 2008. Towards next-generation botnets. In European Conference on Computer Network Defense. EC2ND 2008, 33–40.
27.
go back to reference International Telecommunication Union. 1991. Data communication networks: Open systems interconnection (OSI); security, structure and applications–security architecture for open systems interconnection for CCIT applications. Recommendation X.800, Telecommunication Standardization Sector of ITU, Geneva, Switzerland. International Telecommunication Union. 1991. Data communication networks: Open systems interconnection (OSI); security, structure and applications–security architecture for open systems interconnection for CCIT applications. Recommendation X.800, Telecommunication Standardization Sector of ITU, Geneva, Switzerland.
28.
go back to reference (International Telecommunication Union) ITU. 2008. Itu botnet mitigation toolkit: Background information. Technical report. (International Telecommunication Union) ITU. 2008. Itu botnet mitigation toolkit: Background information. Technical report.
29.
go back to reference Jensen, M., N. Gruschka, and R. Herkenhöner. 2009. A survey of attacks on web services. Computer Science – R&D 24(4): 185–197. Jensen, M., N. Gruschka, and R. Herkenhöner. 2009. A survey of attacks on web services. Computer Science – R&D 24(4): 185–197.
31.
go back to reference Kuzmanonvic, A., and E.W. Knightly. 2006. Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE/ACM Transactions on Networking 14(4): 683–696.CrossRef Kuzmanonvic, A., and E.W. Knightly. 2006. Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE/ACM Transactions on Networking 14(4): 683–696.CrossRef
33.
go back to reference Lee, K., J. Kim, K.H. Kwon, Y. Han, and S. Kim. 2008. DDoS attack detection method using cluster analysis. Expert Systems with Applications 34(3): 1659–1665.CrossRef Lee, K., J. Kim, K.H. Kwon, Y. Han, and S. Kim. 2008. DDoS attack detection method using cluster analysis. Expert Systems with Applications 34(3): 1659–1665.CrossRef
34.
go back to reference Li, Z., A. Goyal, and Y. Chen. 2008. Honeynet-based botnet scan traffic analysis. In Botnet detection: Countering the largest security threat, eds. W. Lee, C. Wang, and D. Dagon, 25–44. Berlin: Springer. Li, Z., A. Goyal, and Y. Chen. 2008. Honeynet-based botnet scan traffic analysis. In Botnet detection: Countering the largest security threat, eds. W. Lee, C. Wang, and D. Dagon, 25–44. Berlin: Springer.
36.
go back to reference Lu, W., M. Tavallaee, and A.A. Ghorbani. 2009. Automatic discovery of botnet communities on large-scale communication networks. In ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS’09), 1–10, Sydney, Australia. Lu, W., M. Tavallaee, and A.A. Ghorbani. 2009. Automatic discovery of botnet communities on large-scale communication networks. In ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS’09), 1–10, Sydney, Australia.
39.
go back to reference McPherson, D., C. Labovitz, M. Hollyman, J. Nazario, and G.R. Malan. 2008. Worldwide infrastructure security report. Technical report, Arbor Networks. McPherson, D., C. Labovitz, M. Hollyman, J. Nazario, and G.R. Malan. 2008. Worldwide infrastructure security report. Technical report, Arbor Networks.
45.
go back to reference Mölsä, J. 2005. Mitigating denial of service attacks: A tutorial. Journal of Computer Security 13(6): 807–837. Mölsä, J. 2005. Mitigating denial of service attacks: A tutorial. Journal of Computer Security 13(6): 807–837.
48.
go back to reference Needham, R.M. 1993. Denial of service. In The 1st ACM Conference on Computer and Communications Security, 151–153, Fairfax. Needham, R.M. 1993. Denial of service. In The 1st ACM Conference on Computer and Communications Security, 151–153, Fairfax.
50.
go back to reference Padmanabhuni, S., V. Singh, K.M.S. Kumar, and A. Chatterjee. 2006. Preventing service oriented denial of service (PreSODoS): A proposed approach. In ICWS ’06: Proceedings of the IEEE International Conference on Web Services, 577–584, Washington, IEEE Computer Society. Padmanabhuni, S., V. Singh, K.M.S. Kumar, and A. Chatterjee. 2006. Preventing service oriented denial of service (PreSODoS): A proposed approach. In ICWS ’06: Proceedings of the IEEE International Conference on Web Services, 577–584, Washington, IEEE Computer Society.
54.
go back to reference Savage, S., N. Cardwell, D. Wetherall, and T. Anderson. 1999. TCP congestion control with a misbehaving receiver. SIGCOMM Computer Communication Review 29(5): 71–78.CrossRef Savage, S., N. Cardwell, D. Wetherall, and T. Anderson. 1999. TCP congestion control with a misbehaving receiver. SIGCOMM Computer Communication Review 29(5): 71–78.CrossRef
55.
go back to reference Sherwood, R., B. Bhattacharjee, and R. Braud 2005. Misbehaving TCP receivers can cause internet-wide congestion collapse. In CCS ’05: Proceedings of the 12th ACM Conference on Computer and Communications Security, 383–392, New York, ACM Press. Sherwood, R., B. Bhattacharjee, and R. Braud 2005. Misbehaving TCP receivers can cause internet-wide congestion collapse. In CCS ’05: Proceedings of the 12th ACM Conference on Computer and Communications Security, 383–392, New York, ACM Press.
56.
go back to reference Smith, J. 2007. Denial of service: Prevention, modelling and detection. Ph.D. thesis, Information Security Institute, Queensland University of Technology, Brisbane, Australia. Smith, J. 2007. Denial of service: Prevention, modelling and detection. Ph.D. thesis, Information Security Institute, Queensland University of Technology, Brisbane, Australia.
60.
go back to reference Stover, S., D. Dittrich, J. Hernandez, and S. Dietrich. 2007. Analysis of the storm and nugache trojans: P2P is here. The USENIX Magazine 32. Stover, S., D. Dittrich, J. Hernandez, and S. Dietrich. 2007. Analysis of the storm and nugache trojans: P2P is here. The USENIX Magazine 32.
61.
go back to reference Strayer, W.T., D. Lapsely, R. Walsh, and C. Livadas. 2008. Botnet detection based on network behavior. In Botnet detection: Countering the largest security threat, eds. vol. 36 Advances in information security, 1–24. Berlin: Springer. Strayer, W.T., D. Lapsely, R. Walsh, and C. Livadas. 2008. Botnet detection based on network behavior. In Botnet detection: Countering the largest security threat, eds. vol. 36 Advances in information security, 1–24. Berlin: Springer.
65.
go back to reference US Committee on National Security Systems. 2006. National information assurance (IA) glossary. Instruction 4009, CNSS. US Committee on National Security Systems. 2006. National information assurance (IA) glossary. Instruction 4009, CNSS.
Metadata
Title
Background
Authors
A. B. Tickle
E. Ahmed
S. M. Bhaskar
G. Mohay
S. Panichprecha
S. V. Raghavan
B. Ravindran
D. Schmidt
S. Suriadi
Copyright Year
2011
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-0277-6_2