Browse > Article
http://dx.doi.org/10.5762/KAIS.2016.17.10.732

Respond System for Low-Level DDoS Attack  

Lee, Hyung-Su (Department of Computer, Graduate School, SoongSil University)
Park, Jae-Pyo (Graduate School of Information Science, SoongSil University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.17, no.10, 2016 , pp. 732-742 More about this Journal
Abstract
This study suggests methods of defense against low-level high-bandwidth DDoS attacks by adding a solution with a time limit factor (TLF) to an existing high-bandwidth DDoS defense system. Low-level DDoS attacks cause faults to the service requests of normal users by acting as a normal service connection and continuously positioning the connected session. Considering this, the proposed method makes it possible for users to show a down-related session by considering it as a low-level DDoS attack if the abnormal flow is detected after checking the amount of traffic. However, the service might be blocked when misjudging a low-level DDoS attack in the case of a communication fault resulting from a network fault, even with a normal connection status. Thus, we made it possible to reaccess the related information through a certain period of blocking instead of a drop through blacklist. In a test of the system, it was unable to block the session because it recognized sessions that are simply connected with a low-level DDoS attack as a normal communication.
Keywords
DDoS; TLF Algorithm;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Jong Yeop Lee, Mi sun Yoon, Hoon Lee, "Monitoring and Investigation of DoS Attack", KNOM Review 2004
2 Alefiya Hussain, "Experience with a Continuous Network Tracing Infrastructure", ACM SIGCOMM'05 Workshops, 2005. DOI: http://dx.doi.org/10.1145/1080173.1080181
3 David Dagon, CliZou, and Wenke Lee. "Modeling botnet propagation using time zones". In Proceedings of the 13th Annual Network and Distributed System Security Symposium, 2006
4 David Dagon, Guofei Gu, Chris Lee, and Wenke Lee. "A taxonomy of botnet structures". In Proceedings of the 23 Annual Computer Security Applications Conference (ACSAC'07), December 2007. DOI: http://dx.doi.org/10.1109/acsac.2007.44
5 E. Messmer. "Nugache worm kicking up a Storm", January 2008.
6 Ki Hoon Kwon, Young Goo Han, Seok Bong Jeong, Se Hun Kim, Soo Hyung Lee, Joong Chan Na, "Fast Detection Scheme for Broadband Network Using Traffic Analysis", KIISC, Vol14, No4, 2004
7 Soon Hwa Hong, "Monitoring and analysis of network traffic using Load Balancing Method", Master's thesis, 2002.
8 Les Cottrell and Connie Logg, "Throughput Time Series Patterns (Diurnal and Step Functions)", July 2004.
9 Beak Do Woon, "Implementation for L7 DDoS Defense", August 2014.
10 Lee Heon Jin, "A Study on The Complex Types DDoS Attacks and Protection", February 2014.
11 Byeong-uk Lee, Cheol-woong Lee, Seung-hun Shin, Byeong-hee Roh, "Implementaion of Modeling and Simulation for DDoS Attack and Detection in Wired Tractical Netwotk Usong OPNET Cyber Effect Model", KCI, Vol12, No2, 2016
12 Dongwon Seo, "Probabilistic Filter Propagation and Scheduling against Distributed Denial-of-Service Attacks", February 2014.
13 Sungmo Jung, "Global Network Security System to Prevent Cyber Attack", February 2014.