Mitigating High-Rate Application Layer DDoS Attacks in Software Defined Networks
|
|
|
- Eunice Fowler
- 10 years ago
- Views:
Transcription
1 Mitigating High-Rate Application Layer DDoS Attacks in Software Defined Networks João Henrique 1, Iguatemi E. Fonseca 1 and Vivek Nigam 1 1 Federal University of Paraíba, Brazil [email protected], {iguatemi,vivek}@ci.ufpb.br Abstract. Differently from previous attacks, many recent DDoS attacks have not been carried out over the network layer, but over the application layer. The main difference is that in the latter, an attacker can target a particular application of the server, while leaving the remaining applications still available, thus generating less traffic and being harder to detect. Recently, we have proposed the use of selective strategies for mitigating Low-Rate Application Layer DDoS attacks (ADDoS). Unfortunately, due to their higher traffic load, High-Rate ADDoS attacks (e.g., GET flooding) remain a serious problem as they still generate traffic in much lower proportions than usual network-layer DDoS attacks, but they generate traffic load high enough to render our and other defenses ineffective. This paper proposes a new defense mechanism, called SHADE, that uses selective strategies in Software Defined Networks (SDN) for mitigating High-Rate ADDoS. As SDN controllers have a global view of the network, they allow redirecting traffic when applications, such as web-servers, are (on the verge of being) overloaded. Traffic is re-directed to mitigation applications implementing our selective strategies, reducing the traffic hitting the target application and ultimately allowing it to serve more clients. We carried out a number of simulations on realistic attack scenarios. Our simulations show that without our defense, the target application can only serve 19% clients with an average time to service of 5.4s, while with our defense it can serve 61% of clients with an average time to service of 1.6s. 1. Introduction Application-Layer Distributed Denial of Service (ADDoS) attacks is a new generation of Distributed Denial of Service (DDoS) attacks where attackers target a particular application by exploiting application layer protocols, such as HTTP and SIP. Differently from Network-Layer DDoS attacks (such as SYN-flooding), which attack the whole machine affecting all its applications, by targeting a single application, ADDoS generates much less traffic and, therefore, are harder to detect using traditional network traffic analysis tools. We can further classify ADDoS attacks into two types: Low-Rate and High-Rate attacks. Low-Rate attacks are carried out by attackers simulating the traffic of legitimate clients. Examples of such attacks include Slowloris [slo13a], POST [rudy13] and Slowread [slo13b] attacks. High-Rate DDoS attacks, on the other hand, are similar to Network-Layer DDoS in that they send a large amount of packages to the target application exhausting its resources. However, as they target a single application and not the whole server, the number of packages is still very small for defenses based on network
2 analysis to be effective. Indeed, GET-Flooding, which is an High-Rate ADDoS attack which sends a large number of GET requests to the target web-server, is one of the most popular DDoS attacks (in 2014, it was placed fourth in popularity after DNS, TCP and UDP flooding [Foc14]). In our previous work [DNF14], we proposed a defense mechanism, called SeVen, for mitigating Low-Rate ADDoS attacks. While SeVen can guarantee very high availability rates (around 95%) against Low-Rate ADDoS attacks, as our simulations demonstrate, it is much less effective against High-Rate ADDoS Attacks with an availability of only 24% of legitimate clients. The main problem, as in all flooding attacks, is the very high rate of packages generated by attackers (more than 180 times the normal client traffic rate). Indeed, without any defense, an Apache web-server suffering a GET-Flooding attack can only serve 19% of the legitimate clients. This paper proposes a new approach for mitigating High-Rate ADDoS attacks by using Software Defined Networks (SDN). By decoupling the control and the data planes. SDN transfers the network controlling, such as routing and traffic management, to a powerful centralized controller with a global overview of the flows in the networks. The lower level hardware, such as switches, simply follow the decisions specified by the controller. SDN, thus, facilitates the management of networks allowing to easily control traffic according to the specified network decision logic. Our contributions are two-fold: SHADE: A SDN framework for mitigating High-Rate ADDoS: As SDN controller s have a global view of the flows in the network, setting the rules for routing packages, it can be used to re-direct the flow towards an application that is overloaded. In particular, we use SeVen additionally for monitoring the capacity use of web-servers (Apache). Whenever SeVen detects that the web-server is in the verge of being overloaded, i.e., its capacity to process request is reaching its limit, then it sends a message to the controller to activate a selective defense. The controller re-directs the flow to this web-server making a de-tour to a mitigating application implementing a selective strategy. The mitigation application will drop a number of packages reducing, thus, the traffic rate that is hitting the overloaded web-server allowing legitimate clients to be served. We call our defense mechanism SHADE Selective High rate DDoS defense; Simulation Results: We implemented this architecture using standard SDN simulators (Mininet [Min15]), and controllers(ryu [ryu15]). 1 We also adapted the code implementing SeVen so that it monitors the web-server s capacity and communicates the controller whenever the web-server is overloaded. Finally, we also implemented SHADE, including the machinery to re-direct traffic using SDN rules. Our simulation results have shown that under a GET-flooding attack (generated using the tool LOIC [LOI13]), without using any defense, only 19% (in average) of legitimate clients with a time to service (TTS) of 5.4 seconds, and using our SHADE, 61% of clients (in average) are served by the web-server with a TTS of approximately 1.6 second. We also observed that SHADE discards in average 70% of the traffic generated by the attackers. This means that a great part of the 1 Due to their precision in simulating SDN networks, carrying out simulations using Mininet is the standard in the SDN literature for validating solutions.
3 useless traffic generated by the attacker is discarded already at the entrance of the network where the web-server is and therefore, not passing through other switches and machines inside the network. This paper is organized as follows: Section 2 briefly reviews the main technologies that we use to implement SHADE, namely SDN and SeVen. We assume some familiarity with SDN. We also explain the main High-Rate ADDoS attack used by attackers and also used here, namely the GET-Flooding attack. Our solution for mitigating High-Rate DDoS attack, namely SHADE, is explained in Section 3 and we detail our main results in Section 4. Finally, we review related work in Section 5 and conclude by pointing out future work in Section Preliminaries We discuss the basic machinery used to develop and validate our ADDoS mitigation solution, namely, the attack GET-Flooding, Software Defined Networks and the defense SeVen. SDN In traditional networks controlling tasks, such as routing, traffic engineering and access control, is implemented in low level machinery, such as routers, implementing for example distributed routing protocols. This makes the maintenance of the network hard and error-prone as each router participates in the implementation of the network decisions [GHM + 05]. SDN solves this problem by decoupling the control plane, where the networking controlling tasks are defined, such as routing, and the data plane, where packages are managed following the decisions specified in the control plane. Programmers can specify the logic of their network decisions, such as traffic management, using standard APIs such as OpenFlow [Ope15]. As they can be easily configured, SDN has been successfully used for a number of applications including DDoS mitigation. However, until now most of this work has concentrated in very large traffic attacks, such as traditional Network-Layer DDoS attacks, such as SYN-Flooding, and Amplification attacks. Few have considered using SDNs for mitigating Low-Rate ADDoS. (More details in Section 5.) GET-Flooding The main High-Rate ADDoS attack used by attackers, called GET- Flooding, exploits the GET method of the HTTP protocol. The idea is simple. The attacker (or his infected bots) simply sends a large amount of GET request to the target web-server exhausting its memory and CPU time in the server making it not serve legitimate clients. Notice that since a web-server has only a fraction of the memory and CPU usage of the machine, one does not require a huge number of packages. Moreover, even amateurs can carry out such an attack by using tools such as LOIC [LOI13]. The GETflooding attack is very effective. It is possible to make a small to mid size web-server unavailable using just some instances (3-4) of LOIC. In 2014, it was one of the four most popular attacks [Foc14]. SeVen Our previous work [DNF14] introduced SeVen, a selective defense for mitigating ADDoS. SeVen uses selective strategy to mitigate DDoS: It works as a proxy and monitors
4 the usage of the web-server under its protection. When the web-server is not overloaded 2, it allows any request (even of attackers) to be processed. However, when the web-server is overloaded (that is, it can no longer process a new request simultaneously), and a new request arrives, SeVen decides (using some probability function) whether the webapplication should process this new request. There are two outcomes: 1. SeVen decides that it should not process this new request, in which case it simply returns a message that the web-server is unavailable; 2. SeVen decides that it should process this new request. Then it should also decide which request being currently processed should be dropped. This decision is taken based on another probability distribution. Intuitively, selective strategies work because whenever an application is overloaded, it is very likely that it is suffering an attack. Instead of blocking all new requests (from both attackers and legitimate clients) as done without our defense, SeVen opens the possibility of new request from legitimate clients to be processed improving considerably the availability of the application. We applied such selective strategies to two different applications: Low-Rate ADDoS exploiting the HTTP protocol [DNF14], namely for mitigating Slowloris and POST attacks, and Telephony Denial of Service attacks exploiting the SIP protocol used in Voice over IP applications [LDF + ed]. 3. SHADE Selective Strategies in SDN Problem Statement Although SeVen works well for mitigating Low-Rate ADDoS attacks, it also suffers when trying to mitigate High-Rate ADDoS attack. This is because SeVen also has limited memory and CPU power and it cannot handle the overwhelming number of packages that arrive when an application is suffering a High-Rate ADDoS, such as in the GET-Flooding attack: When suffering a Low-Rate ADDoS attack, such as a Slowloris attack, SeVen can still guarantee service to 95% of legitimate clients. However, when suffering a High-Rate ADDoS attack, such as GET-Flooding, SeVen can only guarantee service to an average of 24% of legitimate clients. For example, when carrying out the GET-flooding attack, the number of packages arriving the application increases by a factor of 180. Despite this increase on the number of packages, however, the overall traffic increase is very low (of some megabytes) when compared to usual flooding attacks carried out over the network layer. Therefore, defenses based on network analysis tools are not able to detect these attacks [ZJT13]. The problem is, therefore, to develop a mechanism to defend an application (webserver) from both Low-Rate ADDoS and High-Rate ADDoS attacks finding mechanisms to mitigate them. While Low-Rate ADDoS attacks can be handled by SeVen, this paper proposes a mechanism for mitigating High-Rate ADDoS attacks using SDN and SeVen. Proposed Solution Our solution, called SHADE (Selective High rate DDoS defense) combines the following two technologies which have complementary features: 2 That is, the number of request being processed is less than its maximum capacity.
5 Figure 1. Defense Mechanism Topology in an SDN network SeVen s Load Monitoring: In order to apply its selective strategy, SeVen keeps track of resources being used by the web-server, namely, the number of request that are being processed. This allows us to use SeVen as a sensor indicating when the application under its protection is overloaded receiving too many packages. We classify levels of usage, e.g., Green, Yellow and Red, depending on the webserver s usage: Green indicates when the web-server usage is as expected. That is, there are enough free resources, e.g., workers, to process new requests; Yellow indicates that the web-server is being highly used and if it receives more requests, then it will reach its maximum capacity to process request; Red indicates that the web-server s capacity is almost depleted and it cannot or will soon no longer be able to process new requests. SDN s Centralized Control of Flows: SDN controllers have a global view of the network and can control flows by setting rules in switches accordingly. This is a great feature to manage traffic in a network by redirecting a flow so that it passes some particular application, such as load balance applications or intrusion detection applications or in our case, a DDoS mitigation application. Whenever a web-server is overloaded, e.g., in status Yellow or Red, it can communicate this to the controller. The controller can then set the flow to that particular application so that it is redirected to SHADE. Figure 1 illustrates the topology of our defense mechanism against High-Rate DDoS attacks. SeVen is installed together with the applications. We assume a typical SDN setting, with a SDN controller (Ryu), applications (Apache web-servers), legitimate clients (generated using Siege) and attackers (generated by LOIC instances). Whenever SeVen detects a change in the state of the web-server (Green, Yellow or Red), it communicates it to the SDN controller. If the status is Green, then the controller does not redirect the flow to SHADE. Otherwise, it does redirect the flow by installing a higher priority rule in the switch. Figure 2 illustrates how the SDN rule is used to re-direct traffic. The computer to the right sends a package to the server to the left of the figure running SHADE. The
6 Figure 2. Defense Mechanism Topology in an SDN network switch follows the rule installed by the controller. In the diagram in Figure 2, the installed rule translates the destination header of the incoming package to the IP address of the machine running SHADE. Similarly, translates the source IP header of the machine running SHADE to the IP of the machine running the web-server so that the client or attacker does not detect that the flow is passing through SHADE. Finally, the controller also informs SHADE the status of the web-server (Green, Yellow, and Red). SHADE when receiving the flow to the target web-server, uses the SeVen status informed by the controller to apply a selective strategy as follows: Yellow: If the status is Yellow, then SHADE applies a less strict selection strategy dropping less packages. In our simulations, we adopted a Round Robin strategy selecting 1 package of every 3 packages received. The packages not selected are dropped and corresponding client is informed that the service is not available, while the selected packages are sent to the web-server. That is, SHADE reduces by two thirds the traffic hitting the web-server. Red: If the status is Red, then SHADE applies a much more aggressive selection strategy dropping many more packages. In our experiments, SHADE applies a Round Robin strategy selecting just 1 package out of 5 packages received reducing considerably the overall traffic received by the application. Remark: We used just three levels of usage (Green, Yellow, and Red) as they were enough to illustrate that our defense can mitigate High-Rate ADDoS attacks. There are other possibilities such as use instead of the capacity, the rate of incoming packages, or a more fuzzy classification. The best choice will depend on the particular scenario and is left out of the scope of this paper. Example Assume, for illustration only, that the web-server can only process 10 requests and that the status of the web-server is Yellow if the number of requests being processed, n P, is 7 n P < 9, it is Red if n P 9 and Green otherwise. Moreover, assume that it is currently processing the following five requests identified as id 1,..., id 5 : id 1, id 2,..., id 5 Since n P < 7, the status of the web-server is Green. This means that any new request incoming into the network does not pass through SHADE. Assume now that a large number of requests, id 6,..., id 17, possibly due to a DDoS attack, arrive the head of the network where the web-server is. The requests id 6 and id 7
7 are going to arrive SeVen without passing through SHADE because the web-server status is Green. Thus, the web-server starts processing id 6, but when it starts processing id 7, it sends a signal to the controller that its status is now Yellow because n P = 7. This causes the controller to re-direct the flow to the web-server using the SDN rule illustrated above through SHADE implementing our selective strategy. This means that from the next 3 request only one is sent by SHADE to the webserver, i.e., two requests from id 8,..., id 13 are selected. Say id 9 and id 12 are selected by SHADE. These are sent to the web-server, which is now processing the requests: id 1, id 2,..., id 5, id 6, id 7, id 9, id 12 At this point the status of the web-server is Red, which means that SHADE is going to select one request out of the next 5 requests, id 13,..., id 17. Say that it selects the request id 14. The the web-server is processing the requests: id 1, id 2,..., id 5, id 6, id 7, id 9, id 12, id 14 Now the web-server is in its full capacity. SeVen will now adopt its own selective strategy as described in Section 2. However, SHADE is still selecting one out 5 new incoming request reducing the load that is hitting SeVen and the web-server. To illustrate how SeVen works (for more details see [DNF14]) say that a new request id ν arrives SeVen, i.e., it is selected by SHADE. Now, since the maximum capacity of the web-server is reached, SeVen decides whether it will process request id ν or not. It decides this using some criteria (which is not important here). Say that it decides to process request id ν. SeVen has to now decide which one of the requests being currently processed it shall drop. It decides this using some probability, here uniform probability. Say that it decides to drop id 5, then the requests being processed by the web-server are updated to: id 1, id 2,..., id 4, id 6, id 7, id 9, id 12, id 14, id ν where id ν replaces id 5. Therefore, there are two ways a package can be discarded by the selective strategy used by SHADE or by the selective strategy used by SeVen. An advantage of discarding an (attacker) request by using SHADE is that this package does not enter the network. It is blocked already at the network s entrance. On the other hand, discarding a package by using SeVen means that the package traveled the complete route until reaching the web-server before being dropped. Finally, we observe that the use of the selective strategy by SHADE and by SeVen have very different purposes. While the strategy adopted by SeVen is built to mitigate Low-Rate ADDoS attacks, the strategy adopted by SHADE is built to mitigate High-Rate ADDoS attacks. We validate this intuition next by carrying out a number of simulations. 4. Simulation Results Set-up We implemented the scenario depicted in Figure 1 in the simulator Mininet version using the following tools: The applications being defended were Apache web-servers version We used a small-web server with 30 workers;
8 The SDN controller was Ryu [ryu15] version 3.6; For generating the client traffic, we used the tool Siege [Sie15] version We used Siege to simulate 20 legitimate clients; For generating the attack, we used two instances of the tool LOIC [LOI13] version LOIC is a tool developed by the Anonymous group and is often used to carried out DDoS even by amateurs. In our simulations, both instances of LOIC together generated 180 times more attacker traffic than client traffic; We implemented in Python the SDN rules for re-directing flows to SHADE whenever the status of the web-server is Yellow or Red; We implemented SHADE in C++ and modified the SeVen code so that it sends the usage status of the web-applications to the controller. Our simulations were carried out using virtual machines using VMWare Player over a Windows 8.1 machine with a Core i5 processor 4210u and 6 GB of memory. Remark: Due to the limitations of the simulator used, Mininet, in particular, its deficiency in carrying out large flooding attacks, our simulations considered a small web-server with only 30 workers. However, the amount of client and attacker traffic generated was set taking into account the number of workers. We considered three scenarios for our simulations: No Defense: In this scenario, we do not use SeVen nor our SDN defense mechanism. This means that all the traffic generated by the attacker and the client hit the web-server directly; Only SeVen: We add one layer of defense, namely SeVen, to protect the webserver from attacks. As SeVen also applies a selective strategy, we would like to understand how effective it is for High-Rate ADDoS attacks; Using SHADE: Finally, we added our SDN defense mechanism to understand the impact of our defense on mitigating High-Rate ADDoS attacks. We used the following quality parameters to measure how effective our defense mitigation solution is: Availability: We measured the number of packages generated by legitimate clients that were served by the target web-application. We considered as failure to be served, packages that are served after more than 5 seconds. 3 That is, if a client sends a request at time 10 and receives an answer from the web-server only at time 16, we consider this a failure to serve the client. Time of Service (TTS): We measured the average TTS of the packages sent by legitimate clients. That is, the average time that served packages took to be responded by the web-server; Amount of Useless Traffic Discarded: We measured the amount of traffic generated by the attacker that our defense was able to discard. As our defense re-directs traffic already at the entrance of the local network, discarding packages from the attackers reduces the overhead caused by the attack in all the switches where the flow passes by. 3 While there is no consensus on how long a user is willing to wait for a page to load, it seems that 5 seconds is a good threshold. See, for example, articles/the-five-second-rule.html.
9 Scenario Average Availability TTS (s) No defense 17-23% (average 19%) (average 5.4) Only SeVen 15-29% (average 24%) (average 3.4) Using SHADE 58-64% (average 61%) (average 1.6) Table 1. Results Summary on Availability and TTS for the Three Scenarios Considered Results We carried out a number of runs for each scenario (No defense, Only SeVen, and Using SHADE) 8 runs each with duration of 10 minutes. Table 1 summarizes our main results. When using no defense at all, the availability of legitimate clients fluctuated between 17-23% with an average of 19%, while the TTS fluctuated from s with an average of TTS of 5.4. When using only SeVen to defend the Apache web-server, the availability of legitimate clients fluctuated between 15-29% with an average of 24% and the TTS fluctuated from s with an average of 3.4s. Finally, when using SHADE, the availability increased to values between 58 64% with an average of 61% and the TTS decreased to values between s with an average of 1.6s. Clearly, the quality indicators improved by using SeVen, although it is built to mitigate Low-Rate ADDoS, with an increase of 23% in availability and 37% decrease in TTS. However, the quality measures improved considerably when using SHADE with an increase of 220% in availability and a decrease of 70% in TTS. We also investigated how much traffic was dropped by SHADE and by SeVen both generated by attackers, which is useless traffic, and generated by legitimate clients. Table 2 summarizes our observations. Recall that both SHADE and SeVen adopt selective strategies (see end of Section 3). SHADE dropped 412k packages generated by the attacker corresponding 70% of all the traffic generated by the attacker. This means that a large amount of useless traffic generated by the attacker was already dropped at the entrance of the network by SHADE. From the remaining 123k packages, i.e., the remaining 30%, that reached SeVen, only 1.2k packages was actually processed by the web-server. This means that only 0.3% of the total traffic generated by the attacker was processed by the web-server. From the same table, we observe that the traffic generated by the attackers (588k) was almost 180 times greater than the traffic generated by the clients (3.3k). Despite this great difference, more packages from clients (2k) were served than attackers packages (1.2k). A possible explanation for this is the fact that the probability of dropping an attacker package is greater than a client package because there are many more attacker packages than client packages. 5. Related Work There have been other proposal for using SDN for mitigation DDoS attacks. However, most of the literature [SYPG13, HSE14, BMP10, WXG15, FTSB15] on the topic focuses on Network-Layer DDoS attacks, such as SYN-Flooding, which have a much higher volume rate than Application-Layer DDoS attacks. We review some of this work.
10 Traffic Dropped by SHADE (Average) Attacker Traffic 70% 0.3% Client Traffic 36% 61% Accepted by SeVen (Average) Number of Packages Attacker 412k of 588k 1.2k of 123k Number of Packages Client 1.2k of 3.3k 2k of 2.1k Table 2. Traffic Dropped by SHADE and Accepted by SeVen Shin et al. [SYPG13] mitigate DDoS attacks by monitoring the number of handshakes TCP (SYN, SYN-ACK and ACK) that are not completed for each origin IP. If this number exceeds some threshold then it simply blocks the traffic from the IP origin using SDN rules. Since ADDoS attacks completes TCP handshakes, this solution cannot be used to mitigate these attacks. The work of Braga et al. [BMP10] enumerates all possible parameters that can be extracted during an attack over the Network Layer (SYN-Flooding, UDP-Flooding, and ICMP-Flooding). From these parameters, they use a neural network to evaluate whether a flow is an attack or not. As all mechanisms based on neural networks, the classification quality of the network depends on the quality of data used to train them. Therefore, it is unlikely that their networks will be able to mitigate ADDoS attack which have very different behavior. Other works [HSE14] identify possible attacks that exploit weaknesses of the SDN architecture. In particular, they demonstrate the possibility of denying the service of all applications on the SDN network by overflowing switches with a large number of rules. This attack is very different from the type of attacks that we investigate here and it can still be carried out when running SHADE. However, we believe it is possible to use selective strategies similar to the ones used here to mitigate such an attack. We leave this to future work. SDN networks have also been used to mitigate Low-Rate ADDoS [OLL14]. Whenever any suspicious flow is identified they re-direct this flow using SDN rules to an application similar to the target application so that the attacker does not know that it has been identified. Although this work seems to be similar to ours, unfortunately, they do not explain how this could be done, even more so against Low-Rate ADDoS attack that have a very similar traffic profile as legitimate clients. If such distinction was indeed possible, then it would also be easy to incorporate this defense with SHADE. Finally, more recently [FTSB15], Fayaz et al. proposed the combination of SDN networks and Network Function Virtualization (NFV) to mitigate large amplification attacks. Their solution is to identify large volumes of traffic and use suitable applications to mitigate the attack. The difference to our work is that we deal with High-Rate AD- DoS which although have a higher traffic rate than Low-Rate ADDoS, they volume is insignificant compared to Amplification attacks.
11 6. Conclusions and Future Work This paper proposes a novel defense, called SHADE, for mitigating High-Rate Application-Layer DDoS (ADDoS) attacks, namely the GET-Flooding attack, using selective strategies in SDN networks. By exploiting our existing tool SeVen for mitigating Low-Rate DDoS attacks and the fact that SDN controllers have a global view of the network, SHADE can mitigate High-Rate ADDoS attacks already at the entrance of the network where the target application is located. We demonstrated the effectiveness of SHADE by simulation using Mininet. In average, we saw an increase of 220% on availability, from 19% to 61%, and a decrease of 70% in Time to Service, from 5.4s to 1.6s. We also observed that 70% of the traffic generated by the attacker is dropped by SHADE already at the entrance of the network where the application is. There are many directions for future work. We are investigating the effect of SHADE when suffering a combination of Low-Rate and High-Rate ADDoS attacks. We are also considering other selective strategies based on different parameters which may be obtained from the web-server, such as trusted users, etc. We are also intending to implement SHADE in actual SDN networks. Although Mininet simulations is the standard for validating solutions in the SDN literature, it would be better to have actual experiments carried out on a actual SDN network. Finally, we are also investigating how selective strategies can be used to mitigate SDN vulnerabilities such as the Rule Inundation attack that overloads switches with a large number of rules. References [BMP10] [DNF14] R. Braga, E. Mota, and A. Passito. Lightweight DDoS flooding attack detection using nox/openflow. In Local Computer Networks (LCN), 2010 IEEE 35th Conference on, pages , Oct Yuri Gil Dantas, Vivek Nigam, and Iguatemi E. Fonseca. A selective defense for application layer DDoS attacks. In IEEE JISIC 2014, pages 75 82, mid-year-ddos-threat-report-documents-high-volume-high-rate-attacks-on [Foc14] NS Focus. html [FTSB15] Seyed Kaveh Fayaz, Yoshiaki Tobioka, Vyas Sekar, and Michael Bailey. Bohatei: Flexible and elastic ddos defense. In 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015., pages , [GHM + 05] Albert G. Greenberg, Gísli Hjálmtýsson, David A. Maltz, Andy Myers, Jennifer Rexford, Geoffrey G. Xie, Hong Yan, Jibin Zhan, and Hui Zhang. A clean slate 4d approach to network control and management. Computer Communication Review, 35(5):41 54, [HSE14] S. Hommes, R. State, and T. Engel. Implications and detection of dos attacks in openflowbased networks. In Global Communications Conference (GLOBECOM), 2014 IEEE, pages , Dec 2014.
12 [LDF + ed] Marcílio Lemos, Yuri Gil Dantas, Iguatemi E. Fonseca, Vivek Nigam, and Gustavo Sampaio. A selective defense for mitigating coordinated call attacks. Submitted. [LOI13] LOIC [Min15] Mininet [OLL14] Y.E. Oktian, SangGon Lee, and HoonJae Lee. Mitigating denial of service (dos) attacks in openflow networks. In Information and Communication Technology Convergence (ICTC), 2014 International Conference on, pages , Oct [Ope15] OpenFlow [rudy13] r-u-dead yet [ryu15] ryu [Sie15] Siege [slo13a] slowloris [slo13b] slowread [SYPG13] [WXG15] [ZJT13] Seungwon Shin, Vinod Yegneswaran, Phillip Porras, and Guofei Gu. Avant-guard: Scalable and vigilant switch flow management in software-defined networks. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS 13, pages , New York, NY, USA, ACM. Haopei Wang, Lei Xu, and Guofei Gu. Floodguard: A dos attack prevention extension in software-defined networks. In Dependable Systems and Networks (DSN), th Annual IEEE/IFIP International Conference on, pages , June Saman Taghavi Zargar, James Joshi, and David Tipper. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys and Tutorials, 15(4): , 2013.
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, University of Padua, Italy {surname}@math.unipd.it
Future of DDoS Attacks Mitigation in Software Defined Networks
Future of DDoS Attacks Mitigation in Software Defined Networks Martin Vizváry, Jan Vykopal Institute of Computer Science, Masaryk University, Brno, Czech Republic {vizvary vykopal}@ics.muni.cz Abstract.
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Survey on DDoS Attack in Cloud Environment
Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394-3343 p-issn: 2394-5494 Survey on DDoS in Cloud Environment Kirtesh Agrawal and Nikita
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
SDN Security Design Challenges
Nicolae Paladi SDN Security Design Challenges SICS Swedish ICT! Lund University In Multi-Tenant Virtualized Networks Multi-tenancy Multiple tenants share a common physical infrastructure. Multi-tenancy
VALIDATING DDoS THREAT PROTECTION
VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
Network Security: Network Flooding. Seungwon Shin GSIS, KAIST
Network Security: Network Flooding Seungwon Shin GSIS, KAIST Detecting Network Flooding Attacks SYN-cookies Proxy based CAPCHA Ingress/Egress filtering Some examples SYN-cookies Background In a TCP 3-way
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
Towards Autonomic DDoS Mitigation using Software Defined Networking
Towards Autonomic DDoS Mitigation using Software Defined Networking Authors: Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar NDSS Workshop on Security of Emerging Networking Technologies (SENT
DoS/DDoS Attacks and Protection on VoIP/UC
DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements
Enabling Practical SDN Security Applications with OFX (The OpenFlow extension Framework)
Enabling Practical SDN Security Applications with OFX (The OpenFlow extension Framework) John Sonchack, Adam J. Aviv, Eric Keller, and Jonathan M. Smith Outline Introduction Overview of OFX Using OFX Benchmarks
How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks
How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks Stop DDoS before they stop you! James Braunegg (Micron 21) What Is Distributed Denial of Service A Denial of Service attack (DoS)
Stress Testing and Distributed Denial of Service Testing of Network Infrastructures
Faculty of Electrical Engineering and Communication Brno University of Technology Technická 12, CZ-616 00 Brno, Czechia http://www.six.feec.vutbr.cz Stress Testing and Distributed Denial of Service Testing
OpenDaylight Project Proposal Dynamic Flow Management
OpenDaylight Project Proposal Dynamic Flow Management Ram (Ramki) Krishnan, Varma Bhupatiraju et al. (Brocade Communications) Sriganesh Kini et al. (Ericsson) Debo~ Dutta, Yathiraj Udupi (Cisco) 1 Table
A Method for Load Balancing based on Software- Defined Network
, pp.43-48 http://dx.doi.org/10.14257/astl.2014.45.09 A Method for Load Balancing based on Software- Defined Network Yuanhao Zhou 1, Li Ruan 1, Limin Xiao 1, Rui Liu 1 1. State Key Laboratory of Software
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking
DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking Bing Wang Yao Zheng Wenjing Lou Y. Thomas Hou Virginia Polytechnic Institute and State University, Blacksburg, VA, USA
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
48 0890-8044/15/$25.00 2015 IEEE
An Extended SDN Architecture for Network Function Virtualization with a Case Study on Intrusion Prevention Ying-Dar Lin, Po-Ching Lin, Chih-Hung Yeh, Yao-Chun Wang, and Yuan-Cheng Lai Abstract In conventional
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
A denial of service attack against the Open Floodlight SDN controller
A denial of service attack against the Open Floodlight SDN controller Jeremy M. Dover Dover Networks LLC [email protected] Open Floodlight is an open-source software-defined network controller,
A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack
A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack Abhishek Kumar Department of Computer Science and Engineering-Information Security NITK Surathkal-575025, India Dr. P. Santhi
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
BEHAVIORAL SECURITY THREAT DETECTION STRATEGIES FOR DATA CENTER SWITCHES AND ROUTERS
BEHAVIORAL SECURITY THREAT DETECTION STRATEGIES FOR DATA CENTER SWITCHES AND ROUTERS Ram (Ramki) Krishnan, Brocade Communications Dilip Krishnaswamy, IBM Research Dave Mcdysan, Verizon AGENDA Introduction
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
How To Attack A Website With An Asymmetric Attack
DEFENDING AGAINST LOW-BANDWIDTH, ASYMMETRIC DENIAL-OF-SERVICE ATTACKS David W. Holmes (@dholmesf5) F5 Networks Session ID: HT-R02 Session Classification: Intermediate AGENDA Introduction Why does this
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
How To Stop A Ddos Attack On A Website From Being Successful
White paper Combating DoS/DDoS Attacks Using Cyberoam Eliminating the DDoS Threat by Discouraging the Spread of Botnets www.cyberoam.com Introduction Denial of Service (DoS) and Distributed Denial of Service
IP Phone Security: Packet Filtering Protection Against Attacks. Introduction. Abstract. IP Phone Vulnerabliities
W H I T E P A P E R By Atul Verma Engineering Manager, IP Phone Solutions Communications Infrastructure and Voice Group [email protected] Introduction The advantages of a converged voice and data network are
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks
Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)
Denial of Service Attacks and Countermeasures Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS) Student Objectives Upon successful completion of this module,
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
Designing Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
Introduction to DDoS Attacks. Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter
Introduction to DDoS Attacks Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter DDoS in the News Q1 2014 DDoS Attack Trends DDoS Attack Trends Q4 2013 Mobile devices
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
Early Detection of DDoS Attacks in Software Defined Networks Controller
Early Detection of DDoS Attacks in Software Defined Networks Controller By Seyed Mohammad Mousavi A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements
OrchSec: An Orchestrator-Based Architecture For Enhancing Network Monitoring and SDN Control Functions
OrchSec: An Orchestrator-Based Architecture For Enhancing Network Monitoring and SDN Control Functions 9 May 2014 Dr.-Ing. Kpatcha Bayarou Head, Mobile Networks Fraunhofer SIT [email protected]
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
Securing Local Area Network with OpenFlow
Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University
SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1
SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1 A First Step Towards Network Security Virtualization: From Concept To Prototype Seungwon Shin, Haopei
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu Presented by Alaa Shublaq SDN Overview Software-Defined Networking
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Using SYN Flood Protection in SonicOS Enhanced
SonicOS Using SYN Flood Protection in SonicOS Enhanced Introduction This TechNote will describe SYN Flood protection can be activated on SonicWALL security appliance to protect internal networks. It will
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
Load Balancing for Microsoft Office Communication Server 2007 Release 2
Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
ENSC 427 Communications Network Spring 2015 Group 8 http://www.sfu.ca/~spc12/ Samuel Chow <spc12 at sfu.ca> Tenzin Sherpa <tserpa at sfu.
Performance analysis of a system during a DDoS attack ENSC 427 Communications Network Spring 2015 Group 8 http://www.sfu.ca/~spc12/ Samuel Chow Tenzin Sherpa Sam Hoque
Web Application Level Approach against the HTTP Flood Attacks IOSEC HTTP Anti Flood/DoS Security Gateway Module
Web Application Level Approach against the HTTP Flood Attacks IOSEC HTTP Anti Flood/DoS Security Gateway Module While HTTP Flood and DoS attacks are spreading nowadays, there is a new attack surface reduction
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
Open Source Network: Software-Defined Networking (SDN) and OpenFlow
Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
Deployment of Snort IDS in SIP based VoIP environments
Deployment of Snort IDS in SIP based VoIP environments Jiří Markl, Jaroslav Dočkal [email protected] K-209 Univerzita obrany Kounicova 65, 612 00 Brno Czech Republic Abstract This paper describes
DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS
: DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s
Project 4: (E)DoS Attacks
Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
NFV ISG PoC Proposal VNF Router Performance with DDoS Functionality
NFV ISG PoC Proposal VNF Router Performance with DDoS Functionality 1. NFV ISG PoC Proposal 1.1 PoC Team Members Include additional manufacturers, operators or labs should additional roles apply. PoC Project
DDoS Attack Trends and Countermeasures A Information Theoretical Metric Based Approach
DDoS Attack Trends and Countermeasures A Information Theoretical Metric Based Approach Anurag Kochar 1 1 Computer Science Engineering Department, LNCT, Bhopal, Madhya Pradesh, India, [email protected]
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
DoS Attacks Flood Techniques
International Journal of Combinatorial Optimization Problems and Informatics, Vol. 3, No. 2, May-Aug 2012, pp. 3-13. ISSN: 2007-1558. DoS Attacks Flood Techniques Lidia Prudente T., Eleazar Aguirre A.,
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
SDN. What's Software Defined Networking? Angelo Capossele
SDN What's Software Defined Networking? Angelo Capossele Outline Introduction to SDN OpenFlow Network Functions Virtualization Some examples Opportunities Research problems Security Case study: LTE (Mini)Tutorial
A Novel Packet Marketing Method in DDoS Attack Detection
SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun
Characterization and Analysis of NTP Amplification Based DDoS Attacks
Characterization and Analysis of NTP Amplification Based DDoS Attacks L. Rudman Department of Computer Science Rhodes University Grahamstown [email protected] B. Irwin Department of Computer Science
Chapter 28 Denial of Service (DoS) Attack Prevention
Chapter 28 Denial of Service (DoS) Attack Prevention Introduction... 28-2 Overview of Denial of Service Attacks... 28-2 IP Options... 28-2 LAND Attack... 28-3 Ping of Death Attack... 28-4 Smurf Attack...
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
TLP WHITE. Denial of service attacks: what you need to know
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
Brocade NetIron Denial of Service Prevention
White Paper Brocade NetIron Denial of Service Prevention This white paper documents the best practices for Denial of Service Attack Prevention on Brocade NetIron platforms. Table of Contents Brocade NetIron
SHARE THIS WHITEPAPER
Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN) Value-added DoS protection as a service for Software Defined Network (SDN) a solution paper by Radware & NEC Corporation of America Whitepaper
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?
OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control
A Survey of SDN Security Research
A Survey of SDN Security Research Michael Coughlin University of Colorado Boulder [email protected] ABSTRACT Software defined networking (SDN) has established a new method for creating and
