Detecting, Preventing and Mitigating Dos or DDOS Attacks
Detecting, Preventing and mitigating DoS or distributed Dos Attacks
Distributed Denial of Services is constantly evolving from small megabits to massive megabits of data. Many Internet Service providers lack the capacity and the ability to mitigate this problem. Most of these attacks are run from one master station that takes control of millions or many stations and use them as Zombies to launch the attack. This paper uses ideas from peer-reviewed articles to summarize aspects related to detection, prevention, and mitigation of DoS attacks.
Rationale of selecting the papers
The first research paper selected by Kompella, Singh, and Varghese (2007)is titled "On Scallable Attack Detection in the network" from IEEE/ACM Transactions on Networking Journal. I selected this research paper because it showed a significant research on the current issue of denial of service. The research paper also contains knowledge that captures researcher's attention to this topic.
The second research paper of interest is the Wang & Shin, Sept 2003, "Transport-Aware IP Routers: A Built-in Protection Mechanism to counter DDos Attacks" because it tackles a research on IP routers, which are essential in mitigation of DDoS.
The third article by Chen, Park, and Marchany (2007) is titled "A Divide and conquer strategy for thwarting Distributed denial of Service Attacks." This research paper is useful to my study because of the mitigation technique identified: the 'divide and conquer strategy'. The concept works on other spheres of professions, but the author has identified its significance and application.
The techniques and Summary
Kompella et al.'s (2007) "on scalable attack detection in the network" article sought to find out if aggregation could be used to scale detection of attacks at very high speeds. The researcher brings out in the paper this technique. Aggregation has been used with other network functions for attaining higher speeds in IP look-up and the network Quality of Service. Some attacks such as evasion and TCP hijacking are difficult to detect using scalable fashion. This paper focuses on scalable DDoS and scan detection methods proposing another new scalable technique called partial completion filters (PCFs). The three types of attacks as discussed by Kompella et al. (2007) include partial completion attack, attacks that do scanning, and bandwidth attacks (Kompella, Singh, & Varghese, Feb 2007).
Bandwidth attacks are detectable using MULTOPS, sketches, multistage filter techniques and some tools like auto focus. The best method to detect DDoS attacks such as TCP scans and partial completion is PCFs data structure. The difference of PCFs with multistage filters is non-monotonicity, false negatives, different analysis. For instance, multistage filters only increase and do not negate, have one-side errors while PCF are analyzed using a central limit theorem (Kompella, Singh, & Varghese, 2007).
The proposed technique of partial completion filters to detect TCP scans, and partial completion is a promising technique. However, it requires more research because one has to choose between performance and completeness once detecting of intrusions in the network is done scalably. This means that it cannot be effectively implemented in a network without interfering with performance. In general, it can be implemented in the relevant field of the line card with ASIC that contains all the information about packets such as port, destination, and source. The PCFs uses that information to update its counters. Once this information has been obtained the Access control rule use PCFs to activate the forwarding and blocking of any suspicious packets (Chen, Park, & Marchany, May 2007).
The major weaknesses of partial completion filters are that it has high false positives and has altered the performance of any device when fully implemented. Few researches on this area limits the possibility of obtaining useful information is lacking. On the other hand, Partial Completion Filters has strengths of detecting attacks that other detection mechanisms cannot detect (Wang & Shin, 2003). This technique portrays out that behavioral aliasing and spoofing need to be addressed in any scalable solution because they eventually if not addressed properly cause the failure of the technique.
A mitigation technique discussed in this research paper is transport aware IP (tIP) method that provides the router with architecture that classifies its services and manages its resources. The tIP router has a fine-grained QoS classifier and an adaptive weight-based resource manager. It classifies packets in two stages that enable decoupling of the fine-grained Quality of service lookup from the common routing lookup at core routers. Service differentiation and isolation of resources provides a strong inbuilt protective mechanism against DDoS...
Detecting, Preventing or Mitigating Distributed Dos (DDOS) Attacks The Internet continues to be a critical subject due to the increasing attacks based on the major universal communication infrastructures. This study identifies the one detection and two mitigation approaches in developing content to show that DDoS are becoming common in daily business operations. Rationale for selecting the papers The first research paper I selected is titled "Mitigating Dos Attacks Using Performance Model-Driven Adaptive Algorithms"
Auditing, Monitoring, and Detecting of Dos or DDoS Attacks A Dos (denial of service attack) is an attempt to make network or machine resources non-available to legitimate users. Attackers use the Dos to accomplish their goals by flooding the target resources or machines with the superfluous requests or useless packets to overload the systems and prevent users to fulfill their legitimate requests. When Dos originates from a single network or host
i.e. modifying the domain name system. 7. DNS-Based Phishing ("Pharming"): This offense is based on interference in the domain name searching process by modifying the domain name resolution sending the user to a different IP address. 8. Content-Injection Phishing: The phisher introduces fraudulent content into a legitimate website. 9. Data Theft: Malicious code that collects sensitive information stored within the machines in which it is installed. 10. Man-in-the-Middle Phishing: The phisher takes a
Monitoring the type of DDoS attack, the frequency of the attack, duration of attack, and the aggressiveness of the attack all provide clues as to whom may be instituting the attack. The packet stream can be disrupted by the victim by 'pretending' to go offline to the protocol receiving the bandwidth from that particular attack. The rerouting of using available bandwidth to other protocols via an alternative port can
However, nothing can be done until the malware actually occurs. With all the different viruses, worms and Trojans, how can security managers possibly predict what malware will occur next? In contrast, a behavioral rule defines legitimate activity in a system. Any activity not matching the profile will cause the security product to be triggered. As rules are not specific to a particular type of attack, they can block malicious
Networks Security Management Network Security Management Why Threat Management Is Different from Vulnerability Management Studies have attempted to examine on the possibility of implementing an all rounded technology that seeks to manage several layers of OSI networking levels. However, this implementation has considerably lost influence since this approach is defeated by the nature of attacks. Currently, 2600 hacking publication presents to a user several methodologies of attacks. In fact, hacking as become complex
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now