• Title/Summary/Keyword: DDoS attack

Search Result 259, Processing Time 0.026 seconds

Attack Detection Algorithm Using Exponential Smoothing Method on the IPv6 Environment (IPv6 환경에서 지수 평활법을 이용한 공격 탐지 알고리즘)

  • Koo Hyang-Ohk;Oh Chang-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.378-385
    • /
    • 2005
  • Mistaking normal packets for harmful traffic may not offer service in conformity with the intention of attacker with harmful traffic, because it is not easy to classify network traffic for normal service and it for DDoS(Distributed Denial of Service) attack. And in the IPv6 environment these researches on harmful traffic are weak. In this dissertation, hosts in the IPv6 environment are attacked by NETWOX and their attack traffic is monitored, then the statistical information of the traffic is obtained from MIB(Management Information Base) objects used in the IPv6. By adapting the ESM(Exponential Smoothing Method) to this information, a normal traffic boundary, i.e., a threshold is determined. Input traffic over the threshold is thought of as attack traffic.

  • PDF

A Solution Method for DDoS Attack using CDN Technology (CDN 기술을 이용한 DDoS 공격에 대한 대안 방법)

  • Noh, Dae-Hee;You, Dae-Young;An, Beong-Ku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.91-96
    • /
    • 2009
  • The attacks of DDoS use the weakness of Internetworks which can send unlimited great data packets without identification of IP address. In this paper, we propose a solution method for DDoS attacks using CDN technology. The performance evaluation of the proposed solution method is performed via simulation.

  • PDF

Admission Control based DDoS Attack Defense Mechanism focused on Web-Server Resource Consumption (Admission Control 기반 웹 서비스 부하 유발 형 DDoS 공격대응 메커니즘)

  • Lee, Tai-Jin;Im, Chae-Su;Im, Chae-Tae;Jung, Hyun-Chul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.26-29
    • /
    • 2010
  • 네트워크 대역폭 소모 위주로 발생했던 DDoS 공격이 최근에는 웹서비스 대상 시스템 부하 유발을 통해 가용성을 떨어뜨리는 응용계층에서의 DDoS 공격 위주로 발생하고 있다. 이러한 DDoS 공격에 대응하기 위해 History, IP 분산도, GRT, Behavior 기반 등 다양한 대응 메커니즘이 연구되고 있지만 연구초기 단계에 머물러 있다. 본 논문에서는 Admission Control 기반 DDoS 공격대응 메커니즘을 제안하고, 시스템 개발을 통해 성능을 검증하였다. 제안된 메커니즘은 지금까지 발생한 모든 응용계층 DDoS 공격유형에 대응 가능하며, 기존 Behavior 기반 대응기법은 오탐지 가능성이 있으나 제안하는 메커니즘은 오탐지가 발생하지 않는 장점이 있어, 상용 환경에 바로 적용할 수 있을 것으로 예상된다.

  • PDF

A Client-based DDoS Attack Defense Mechanism through User Authentication (사용자 인증을 통한 클라이언트 기반 DDoS 공격 대응 매커니즘)

  • Jeong, Jongkap;Lee, Heejo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.782-785
    • /
    • 2011
  • 최근의 분산 서비스 거부(DDoS) 공격 방법은 점점 더 자동화, 다양화되고 있으며, 단순한 개별 기업에 대한 공격에서부터 국가간의 사이버전쟁으로까지 그 영역이 확대되고 있다. DDoS 공격은 이미 2000 년도 이전부터 발생해온 오래된 공격이고, 이를 방어하기 위한 다양한 DDoS 공격 방어 시스템을 구축하고 있음에도 불구하고 아직까지 이를 효과적으로 차단하지 못하고 있다. 이는 그간 DDoS 공격 방어 시스템이 공격이 시작되었을 때 개개의 공격 패턴을 탐지하고 차단하는 방법으로 발전해 왔기 때문이다. 따라서 좀 더 효과적인 DDoS 공격 대응을 위해 공격 트래픽이 발송되기 전에 클라이언트에서부터 공격에 대응하는 방안이 필요하다. 이에 본 논문에서는 사용자 인증을 통하여 등록된 사용자임을 검증하고, 클라이언트와 인증장비간의 인증을 통해 인증된 사용자의 트래픽만 허용하는 매커니즘을 제안한다.

An Analysis of Network Traffic on DDoS Attacks against Web Servers (웹 서버에 대한 DDoS공격의 네트워크 트래픽 분석)

  • Lee, Cheo-Iho;Choi, Kyung-Hee;Jung, Gi-Hyun;Noh, Sang-Guk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.253-264
    • /
    • 2003
  • This paper presents the analytic model of Distributed Denial-of-Service (DDoS) attacks in two settings: the normal Web server without any attack and the Web server with DDoS attacks. In these settings, we measure TCP flag rate, which is expressed in terms of the ratio of the number of TCP flags, i.e., SYN, ACK, RST, etc., packets over the total number of TCP packets, and Protocol rate, which is defined by the ratio of the number of TCP (UDP or ICMP) packets over the total number of W packets. The experimental results show a distinctive and predictive pattern of DDoS attacks. We wish our approach can be used to detect and prevent DDoS attacks.

Multi-Vector Defense System using Reverse Proxy Group and PMS(Patch Management System) Construction (Reverse Proxy Group과 PMS를 이용한 멀티벡터(Multi-Vector) DDoS 공격 방어시스템 구축 방안)

  • Kim, Min-Su;Shin, Sang-Il;Kim, JongMin;Choi, KyongHo;Lee, Daesung;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.79-86
    • /
    • 2013
  • The objective of DDoS Attacks is to simply disturb the services. In recent years, the DDoS attacks have been evolved into Multi-Vector Attacks which use diversified and mixed attacking techniques. Multi-Vector Attacks start from DDoS Attack and Malware Infection, obtain inside information, and make zombie PC to reuse for the next DDoS attacks. These forms of Multi-Vector Attacks are unable to be prevented by the existing security strategies for DDoS Attacks and Malware Infection. This paper presents an approach to effectively defend against diversified Multi-Vector attacks by using Reverse Proxy Group and PMS(Patch Management Server).

Detection System Model of Zombie PC using Live Forensics Techniques (활성 포렌식 기술을 이용한 좀비 PC 탐지시스템 모델)

  • Hong, Jun-Suk;Park, Neo;Park, Won-Hyung
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.3
    • /
    • pp.117-128
    • /
    • 2012
  • There was a large scale of DDoS(Distributed Denial of Service) attacks mostly targeted at Korean government web sites and cooperations's on March 4, 2010(3.4 DDoS attack) after 7.7 DDoS on July 7, 2009. In these days, anyone can create zombie PCs to attack someone's website with malware development toolkits and farther more improve their knowledge of hacking skills as well as toolkits because it has become easier to obtain these toolkits on line, For that trend, it has been difficult for computer security specialists to counteract DDoS attacks. In this paper, we will introduce an essential control list to prevent malware infection with live forensics techniques after analysis of monitoring network systems and PCs. Hopefully our suggestion of how to coordinate a security monitoring system in this paper will give a good guideline for cooperations who try to build their new systems or to secure their existing systems.

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

Distributed Attack Analysis and Countermeasure (분산처리 공격에 대한 방어방법 연구)

  • Shin, Miyea
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.19-23
    • /
    • 2015
  • Distributed Denial of Service attack is a form of denial of service attacks, the attacker to attack a place in a number of points of attack by a wide variety of forms over the network to perform a service on a point attack . Do not use a specific server or client attempts to make a connection to many services available that prevents this attack and so normally used . Corresponding methods of DDoS attacks has a corresponding managerial aspects and technical aspects of the proposed two.

  • PDF

A Study of optimized MDS defense against DDoS attack on RFID network (RFID MDS 시스템의 DDoS 공격 가능성 분석과 방어책에 관한 연구)

  • Nam Dong Il;Choi B. J.;Yoo S. W.
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.19-24
    • /
    • 2005
  • Radio Frequency Identification (RFID) is a technology used to identify the physical objects and get information about the object on which the tag attaches from network. It is expected that RFID will lead IT market from human-oriented to object-oriented. Therefore, RFID technology and services will become wide-spread. But the system of RFID naming service is quite similar to the existing DNS facilities. So it has many weak points against to DDos attack. Furthermore if the MDS server Is under attack, there might be trouble of total RFID networks.In this paper, we propose a new detecting model to find attack traffic at local routers by using Management Information Base (MIB) which is optimized for RFID MDS server.

  • PDF