Skip to main content

2015 | OriginalPaper | Buchkapitel

You Can’t Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud

verfasst von : Baohui Li, Wenjia Niu, Kefu Xu, Chuang Zhang, Peng Zhang

Erschienen in: Applications and Techniques in Information Security

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, Distributed Denial of Service (DDoS) attack without employing spoofing source addresses (e.g., SMTP Flood, HTTP/GET Flood [1]) becomes increasingly pervasive. Specially, the advent of cloud computing has exacerbated this situation, increasing the power of distributed massive attacks while involving the responsibility of cloud service provider (CSP) that do not own appropriate solutions. Therefore, we present a novel defense method srcTrace, leveraged by CSPs, to traceback malware residing in cloud-bots. srcTrace begins with identifying attack flows, then tracebacks the malicious processes based on attack flows’ address information. Experimental results and analysis show that srcTrace can correctly traceback malware in ms time level, reducing the impacts both upon cloud tenants and attack targets.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, J., Yang, X., Long, K.: Http-flood DDoS detection scheme based on large deviation and performance analysis. J. Softw. 34, 1272–1280 (2012). Beijing, ChinaCrossRef Wang, J., Yang, X., Long, K.: Http-flood DDoS detection scheme based on large deviation and performance analysis. J. Softw. 34, 1272–1280 (2012). Beijing, ChinaCrossRef
2.
Zurück zum Zitat Lua, R., Yow, K.C.: Mitigating DDoS attacks with transparent and intelligent fast-flux swarm network. IEEE Netw. 25, 28–33 (2011). New YorkCrossRef Lua, R., Yow, K.C.: Mitigating DDoS attacks with transparent and intelligent fast-flux swarm network. IEEE Netw. 25, 28–33 (2011). New YorkCrossRef
3.
Zurück zum Zitat Badis, H., Doyen, G., Khatoun, R.: Understanding botclouds from a system perspective: a principal component analysis. In: Network Operations and Management Symposium, pp. 1–9. IFIP/IEEE, New York (2014) Badis, H., Doyen, G., Khatoun, R.: Understanding botclouds from a system perspective: a principal component analysis. In: Network Operations and Management Symposium, pp. 1–9. IFIP/IEEE, New York (2014)
7.
Zurück zum Zitat Hammi, B., Guillaume, D., Khatoun, R.: A collaborative approach for a source based detection of botclouds. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 906–909. IEEE Press, New York (2015) Hammi, B., Guillaume, D., Khatoun, R.: A collaborative approach for a source based detection of botclouds. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 906–909. IEEE Press, New York (2015)
8.
Zurück zum Zitat Hammi, B., Khatoun, R., Doyen, G.: A factorial space for a system-based detection of botcloud activity. In: 2014 6th International Conference on Mobility and Security (NTMS), pp. 1–5. IEEE Press, New York (2014) Hammi, B., Khatoun, R., Doyen, G.: A factorial space for a system-based detection of botcloud activity. In: 2014 6th International Conference on Mobility and Security (NTMS), pp. 1–5. IEEE Press, New York (2014)
9.
Zurück zum Zitat Kim, Y., Lau, W.C., Chuah, M.C., et al.: Packetscore: statistics-based overload control against distributed denial-of-service attacks. In: Proceedings of IEEE INFOCOM, pp. 2594–2604. IEEE Press, New York (2004) Kim, Y., Lau, W.C., Chuah, M.C., et al.: Packetscore: statistics-based overload control against distributed denial-of-service attacks. In: Proceedings of IEEE INFOCOM, pp. 2594–2604. IEEE Press, New York (2004)
10.
Zurück zum Zitat Sun, Z.X., Tang, Y.W., Zhang, W., et al.: A router anomaly traffic filter algorithm based on character aggregation. J. Softw. 17, 295–304 (2006). Beijing, ChinaMATHCrossRef Sun, Z.X., Tang, Y.W., Zhang, W., et al.: A router anomaly traffic filter algorithm based on character aggregation. J. Softw. 17, 295–304 (2006). Beijing, ChinaMATHCrossRef
11.
Zurück zum Zitat Mirkovic, J., Reiher, P.: D-WARD: a source-end defense against flooding denial-of-service attacks. IEEE Trans. Dependable Secure Comput. 2, 216–232 (2005). IEEE Press, New YorkCrossRef Mirkovic, J., Reiher, P.: D-WARD: a source-end defense against flooding denial-of-service attacks. IEEE Trans. Dependable Secure Comput. 2, 216–232 (2005). IEEE Press, New YorkCrossRef
12.
Zurück zum Zitat He, Y., Chen, W., Xiao, B., et al.: An efficient and practical defense method against DDoS attack at the source-end. In: International Conference on Parallel & Distributed Systems, pp. 265–269. IEEE Press, New York (2005) He, Y., Chen, W., Xiao, B., et al.: An efficient and practical defense method against DDoS attack at the source-end. In: International Conference on Parallel & Distributed Systems, pp. 265–269. IEEE Press, New York (2005)
13.
Zurück zum Zitat Barham, P., Dragovic, B., Fraser, K., et al.: Xen and the art of virtualization. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles, pp. 164–177. ACM Press, New York (2003) Barham, P., Dragovic, B., Fraser, K., et al.: Xen and the art of virtualization. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles, pp. 164–177. ACM Press, New York (2003)
14.
Zurück zum Zitat Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley-Interscience, New York (2007) Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley-Interscience, New York (2007)
15.
Zurück zum Zitat Payne, B.D., De Carbone, M.D.P., Lee, W.: Secure and flexible monitoring of virtual machines. In: Twenty-Third Annual Computer Security Applications Conference, pp. 385–397. IEEE Press, New York (2007) Payne, B.D., De Carbone, M.D.P., Lee, W.: Secure and flexible monitoring of virtual machines. In: Twenty-Third Annual Computer Security Applications Conference, pp. 385–397. IEEE Press, New York (2007)
Metadaten
Titel
You Can’t Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud
verfasst von
Baohui Li
Wenjia Niu
Kefu Xu
Chuang Zhang
Peng Zhang
Copyright-Jahr
2015
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-48683-2_18