Skip to main content

2018 | OriginalPaper | Buchkapitel

21. Techniques for Detecting and Preventing Denial of Service Attacks (a Systematic Review Approach)

verfasst von : Hossein Zare, MS, PhD, Mojgan Azadi, RNC, Informatics MSN, PhD, Peter Olsen, MSOR, Ae.E

Erschienen in: Information Technology - New Generations

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper analyzes denial of service (DoS) attacks and countermeasures based on a systematic review analysis conducted of papers between 2000 and 2016. The paper is based on three searches. The first was conducted using suitable keywords, the second using references used by selected papers, and, the third considered the most cited English-language articles. We discuss 802.11 along with one of the well-known DoS attacks at physical-level access points. Experts suggest using 802.11w, a “cryptographic client puzzle,” and “delaying the effect of request” to provide better protection in this layer. The paper discusses four main network defense systems against network-based attacks—source-end, core-end, victim-end, and distributed techniques—with a focus on two innovative methods, the D-WARD and gossip models. This study also discusses chi-squares and intrusion detection systems (IDSs), two effective models to detect DoS and DDoS attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Goodrich, M., & Tamassia, R. (2010). Introduction to computer security. Boston: Addison-Wesley Publishing Company. Goodrich, M., & Tamassia, R. (2010). Introduction to computer security. Boston: Addison-Wesley Publishing Company.
4.
Zurück zum Zitat Mell, P., Marks, D., & McLarnon, M. (2000). A denial-of-service resistant intrusion detection architecture. Computer Networks, 34, 641–658.CrossRef Mell, P., Marks, D., & McLarnon, M. (2000). A denial-of-service resistant intrusion detection architecture. Computer Networks, 34, 641–658.CrossRef
5.
Zurück zum Zitat Mamun, M. S. I., & Kabir, A. S. (2010). Hierarchical design based intrusion detection system for wireless ad hoc sensor network. International Journal of Network Security & Its Applications (IJNSA), 2, 102–117.CrossRef Mamun, M. S. I., & Kabir, A. S. (2010). Hierarchical design based intrusion detection system for wireless ad hoc sensor network. International Journal of Network Security & Its Applications (IJNSA), 2, 102–117.CrossRef
6.
Zurück zum Zitat Beitollahi, H., & Deconinck, G. (2012). Analyzing well-known countermeasures against distributed denial of service attacks. Computer Communications, 35, 1312–1332.CrossRef Beitollahi, H., & Deconinck, G. (2012). Analyzing well-known countermeasures against distributed denial of service attacks. Computer Communications, 35, 1312–1332.CrossRef
7.
Zurück zum Zitat Mirkovic, J., & Reiher, P. (2005). D-WARD: A source-end defense against flooding denial-of-service attacks. IEEE Tansactions on Dependable and Secure Computing, 2, 216–232.CrossRef Mirkovic, J., & Reiher, P. (2005). D-WARD: A source-end defense against flooding denial-of-service attacks. IEEE Tansactions on Dependable and Secure Computing, 2, 216–232.CrossRef
8.
Zurück zum Zitat Zhang, G., & Parashar, M. (2006). Cooperative defence against ddos attacks. Journal of Research and Practice in Information Technology, 38, 69–84. Zhang, G., & Parashar, M. (2006). Cooperative defence against ddos attacks. Journal of Research and Practice in Information Technology, 38, 69–84.
9.
Zurück zum Zitat Oikonomou, G. C., Mirkovic, J., Reiher P. L., & Robinson, M. (2006). A framework for a collaborative DDoS defense. In ACSAC (pp. 33–42). Oikonomou, G. C., Mirkovic, J., Reiher P. L., & Robinson, M. (2006). A framework for a collaborative DDoS defense. In ACSAC (pp. 33–42).
10.
Zurück zum Zitat Anderson, T., Roscoe, T., & Wetherall, D. (2004). Preventing Internet denial-of-service with capabilities. ACM SIGCOMM Computer Communication Review, 34, 39–44.CrossRef Anderson, T., Roscoe, T., & Wetherall, D. (2004). Preventing Internet denial-of-service with capabilities. ACM SIGCOMM Computer Communication Review, 34, 39–44.CrossRef
11.
Zurück zum Zitat Toledo, A. L., & Wang, X. (2008). Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks. IEEE Transactions on Information Forensics and Security, 3, 347–358.CrossRef Toledo, A. L., & Wang, X. (2008). Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks. IEEE Transactions on Information Forensics and Security, 3, 347–358.CrossRef
13.
Zurück zum Zitat Bicakci, K., & Tavli, B. (2009). Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. Computer Standards & Interfaces, 31, 931–941.CrossRef Bicakci, K., & Tavli, B. (2009). Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. Computer Standards & Interfaces, 31, 931–941.CrossRef
14.
Zurück zum Zitat IEEE working group. (2010). IEEE standard for information technology–Telecommunications and information exchange between systems–Local and metropolitan area networks–Specific requirements–Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Wireless Access in Vehicular Environments. IEEE standards, 802, 11p. IEEE working group. (2010). IEEE standard for information technology–Telecommunications and information exchange between systems–Local and metropolitan area networks–Specific requirements–Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Wireless Access in Vehicular Environments. IEEE standards, 802, 11p.
15.
Zurück zum Zitat Bellardo. J, & Savage, S. (2003, August). Denial of service attacks: Real vulnerabilities and practical solutions. In Proceedings of the 12TH USENIX Security Symposium (pp. 4–8). Washington, DC. Bellardo. J, & Savage, S. (2003, August). Denial of service attacks: Real vulnerabilities and practical solutions. In Proceedings of the 12TH USENIX Security Symposium (pp. 4–8). Washington, DC.
16.
Zurück zum Zitat Bernaschi, M., Ferreri, F., & Valcamonici, L. (2008). Access points vulnerabilities to DoS attacks in 802.11 networks. Wireless Networks, 14, 159–169.CrossRef Bernaschi, M., Ferreri, F., & Valcamonici, L. (2008). Access points vulnerabilities to DoS attacks in 802.11 networks. Wireless Networks, 14, 159–169.CrossRef
Metadaten
Titel
Techniques for Detecting and Preventing Denial of Service Attacks (a Systematic Review Approach)
verfasst von
Hossein Zare, MS, PhD
Mojgan Azadi, RNC, Informatics MSN, PhD
Peter Olsen, MSOR, Ae.E
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-54978-1_21