Skip to main content
Top

2012 | OriginalPaper | Chapter

2. Size Constraint Group Testing and DoS Attacks

Author : My T. Thai

Published in: Group Testing Theory in Network Security

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter, we introduce the first application of group testing in detecting application Denial-of-Service (DoS) attack , which aims at disrupting application service rather than depleting the network resource. This attack has emerged as one of the greatest threat to network services. Owing to its high similarity to legitimate traffic and much lower launching overhead than classic DoS attack, this new assault type cannot be efficiently detected or prevented by existing detection solutions. To identify application DoS attack, we present a novel group testing (GT)-based approach deployed on back-end servers, which not only offers a theoretical method to obtain short detection delay and low false positive/negative rate, but also provides an underlying framework against general network attacks. This new application requires a new class of group testing, called size constraint group testing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sekar V, Duffield N, van der Merwe K, Spatscheck O, Zhang. H (2006) LADS: large-scale automated DDoS detection system. In: USENIX annual technical conference 2006 Sekar V, Duffield N, van der Merwe K, Spatscheck O, Zhang. H (2006) LADS: large-scale automated DDoS detection system. In: USENIX annual technical conference 2006
2.
go back to reference Kandula S, Katabi D, Jacob M, Berger AW (2005) Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds 2nd NSDI. MA, Boston, May 2005 Kandula S, Katabi D, Jacob M, Berger AW (2005) Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds 2nd NSDI. MA, Boston, May 2005
3.
go back to reference Ranjan S, Swaminathan R, Uysal M, Knightly E (2006) DDos-resilient scheduling to counter application layer attacks under imperfect detection. In Proceedings of the IEEE infocom, barcelona, Spain, April, 2006 Ranjan S, Swaminathan R, Uysal M, Knightly E (2006) DDos-resilient scheduling to counter application layer attacks under imperfect detection. In Proceedings of the IEEE infocom, barcelona, Spain, April, 2006
4.
go back to reference Kim Y, Lau WC, Chuah MC, Chao HJ (2004) Packetscore: statisticsbased overload control against distributed denial-of-service attacks. In: Proceedings of infocom, HongKong, 2004 Kim Y, Lau WC, Chuah MC, Chao HJ (2004) Packetscore: statisticsbased overload control against distributed denial-of-service attacks. In: Proceedings of infocom, HongKong, 2004
5.
go back to reference Du DZ, Hwang FK (2006) Pooling designs: group testing in molecular biology. World Scientific, Singapore Du DZ, Hwang FK (2006) Pooling designs: group testing in molecular biology. World Scientific, Singapore
6.
go back to reference Atallah MJ, Goodrich MT, Tamassia R (2005) Indexing information for data forensics, ACNS. Lecture notes in computer science vol 3531. Springer, Heidelberg, pp 206–221 Atallah MJ, Goodrich MT, Tamassia R (2005) Indexing information for data forensics, ACNS. Lecture notes in computer science vol 3531. Springer, Heidelberg, pp 206–221
7.
go back to reference Ricciulli L, Lincoln P, Kakkar P (1999) TCP SYN flooding defense. In: Proceedings of CNDS Ricciulli L, Lincoln P, Kakkar P (1999) TCP SYN flooding defense. In: Proceedings of CNDS
8.
go back to reference Gligor VD (2003) Guaranteeing access in spite of distributed service-flooding attacks. In: Proceedings of the security protocols workshop Gligor VD (2003) Guaranteeing access in spite of distributed service-flooding attacks. In: Proceedings of the security protocols workshop
9.
go back to reference Kargl F, Maier J, Weber M (2001) Protecting web servers from distributed denial of service attacks. In WWW ’01: Proceedings of the 10th international conference on World Wide Web. ACM Press, New York, USA, pp 514–524 Kargl F, Maier J, Weber M (2001) Protecting web servers from distributed denial of service attacks. In WWW ’01: Proceedings of the 10th international conference on World Wide Web. ACM Press, New York, USA, pp 514–524
10.
go back to reference Thai MT, Xuan Y, Shin I, Znati T (2008) On detection of malicious users using group testing techniques. In: Proceedings of IEEE international conference on distributed computing systems (ICDCS) Thai MT, Xuan Y, Shin I, Znati T (2008) On detection of malicious users using group testing techniques. In: Proceedings of IEEE international conference on distributed computing systems (ICDCS)
11.
go back to reference Sharma P, Shah P, Bhattacharya S (2003) Mirror hopping approach for selective denial of service prevention in WORDS’03 Sharma P, Shah P, Bhattacharya S (2003) Mirror hopping approach for selective denial of service prevention in WORDS’03
12.
go back to reference Service provider infrastructure security: detecting, tracing, and mitigating network-wide anomalies (2005). http://www.arbornetworks.com 2005 Service provider infrastructure security: detecting, tracing, and mitigating network-wide anomalies (2005). http://​www.​arbornetworks.​com 2005
13.
14.
go back to reference Eppstein D, Goodrich MT, Hirschberg D (2005) Improved combinatorial group testing algorithms for real-world problem sizes WADS. LNCS vol 3608. Springer, Heidelberg, pp 86–98 Eppstein D, Goodrich MT, Hirschberg D (2005) Improved combinatorial group testing algorithms for real-world problem sizes WADS. LNCS vol 3608. Springer, Heidelberg, pp 86–98
15.
go back to reference Mori G, Malik J (2003) Recognizing objects in adversarial clutter: breaking a visual captcha. IEEE Computer Vision and Pattern Recognition Mori G, Malik J (2003) Recognizing objects in adversarial clutter: breaking a visual captcha. IEEE Computer Vision and Pattern Recognition
16.
go back to reference Dyachkov AD, Rykov VV, Rachad AM (1989) Superimposed distance codes. Prob Control Inform Thy 18:237–250MATH Dyachkov AD, Rykov VV, Rachad AM (1989) Superimposed distance codes. Prob Control Inform Thy 18:237–250MATH
17.
go back to reference Dyachkov AG, Macula AJ, Torney DC, Vilenkin PA (2001) Two models of nonadaptive group testing for designing screening experiments. In: Proceeding 6th International workshop on model-oriented designs and analysis. p 635 Dyachkov AG, Macula AJ, Torney DC, Vilenkin PA (2001) Two models of nonadaptive group testing for designing screening experiments. In: Proceeding 6th International workshop on model-oriented designs and analysis. p 635
Metadata
Title
Size Constraint Group Testing and DoS Attacks
Author
My T. Thai
Copyright Year
2012
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-0128-5_2