Real-Time Detection of Stealthy DDoS Attacks Using Time-Series Decomposition
|
|
|
- Rosaline Flynn
- 9 years ago
- Views:
Transcription
1 Real-Time Detection of Stealthy DDoS Attacks Using Time-Series Decomposition Haiqin Liu and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington , U.S.A. Abstract Recently, many new types of distributed denial of service (DDoS) attacks have emerged, posing a great challenge to intrusion detection systems. In this paper, we introduce a new type of DDoS attacks called stealthy DDoS attacks, which can be launched by sophisticated attackers. Such attacks are different from traditional DDoS attacks in that they cannot be detected by previous detection methods effectively. In response to this type of DDoS attacks, we propose a detection approach based on time-series decomposition, which divides the original time series into trend and random components. It then applies a double autocorrelation technique and an improved cumulative sum technique to the trend and random components, respectively, to detect anomalies in both components. By separately examining each component and synthetically evaluating the overall results, the proposed approach can greatly reduce not only false positives and negatives but also detection latency. In addition, to make our method more generally applicable, we apply an adaptive sliding-window to our real-time algorithm. We evaluate the performance of the proposed approach using real Internet traces, demonstrating its effectiveness. I. INTRODUCTION Nowadays, distributed denial of service (DDoS) attacks pose one of the most serious security threats to the Internet [] [3]. DDoS attacks can result in a great damage to network services. The DDoS attackers usually utilize a large number of puppet machines to launch attacks against one or more targets, which can exhaust the resources of the victim side. That makes the victim host lose the capability to serve the legitimate customers. Since DDoS attacks can greatly degrade the performance of the network and are difficult to detect, they have become one of the most serious security challenges to the current intrusion detection systems (IDS) [], [4], []. Concerning the current state of the network, every corner of the world is likely to be the target of DDoS attacks. However, as long as they are detected early, the loss can be reduced to the minimum. Therefore, DDoS attack detection still attracts much concern from researchers. Over the past decade, many efforts have been devoted to the detection of DDoS attacks. A typical approach to detecting DDoS attacks in a network is to detect whether the amount of the total flow or other similar metrics exceeds a certain threshold, which is determined based on the traffic history. However, the problem of identifying attack traffic is generally difficult because currently the pattern of the normal network flow is so dynamic and changing that those fixed thresholds can result in a high false positive rate. There are methods that utilize adaptive thresholds which can change according to the network conditions [6]. The main drawback of such methods is that those thresholds are still hard to be determined to get high detection accuracy, and that the effectiveness greatly depends on the previous training by using historical data. Moreover, attackers can still manipulate their traffic and packets to defeat detection. We introduce a new type of DDoS attacks called stealthy DDoS attacks, which can be launched by sophisticated attackers. For example, a smart attacker can inject the attack traffic in a very slow speed in order to increase those thresholds and thus achieve the final attack goal. Such DDoS attacks are called shrew DDoS attacks or low-rate DDoS attacks [7], and are a subclass of stealthy DDoS attacks. Cheng et al. firstly utilized the power spectral density (PSD) of network flow to detect general TCP SYN flood [8]. Chen and Hwang also used the power spectral density (PSD) of network flow to detect shrew attacks [9]. The attack types they focused on are stealthy, periodic, pulsing, low-rate, and embedded in TCP or UDP flows. Luo and Chang studied the characteristics of shrew attacks with a wavelet-based approach []. Lu and his group [] proposed a network-wide detection scheme for DDoS attacks by exploiting spatial and temporal correlation of attack traffic. Their study mainly focused on the spoofed address attack, which is unsuitable for detecting recent attacks launched from true source IP addresses []. In addition, a number of PCA-based approaches [3], [4] were proposed to detect network-wide DDoS attacks by decomposing the original traffic into the normal and abnormal subspaces and then finding out statistical outliers in the abnormal subspace. Since the PCA-based approaches usually require pretreatment on the feature matrix like the zero-mean transformation, which is necessary for the detection accuracy of them, we argue that the PCA methods is hard, if not impossible, to be adopted in realtime detection. Unfortunately, none of the defense schemes above can identify and filter out general stealthy DDoS attacks effectively and accurately. The main reason is that zombies can increase the number of attack packets in a very low pace, which will be able to defeat the traditional baseline-based detection schemes by stealthily promoting those baselines. In order to detect them, new approach needs to be proposed. In this paper, we adopt flow connection entropy (FCE)
2 series to reduce the dimensionality of the high-dimensional traffic sequence, and then use the time-series decomposition method to divide the FCE series into a trend component and a steady random component. We then analyze those components to detect the anomaly of both long-term and short-term trends in the traffic. By separately analyzing each component and synthetically evaluating the result, we can get obtain the overall behavior of the traffic for the real-time anomaly detection. The remainder of this paper is organized as follows. Section II introduces stealthy DDoS attacks. Section III describes the time series properties of the network traffic and the rationale and methodology of traffic decomposition. A real-time stealthy DDoS detecting algorithm is proposed in Section IV. In Section V, experimental results are presented and the conclusion follows in Section VI. II. STEALTHY DDOS ATTACKS We introduce the fundamentals of stealthy DDoS attacks and compare their properties with traditional DDoS attacks. Based on the comparison, we present in detail why this kind of DDoS attacks cannot be easily detected by the conventional methods. Length of burst L Fig.. Period of attack T Burst rate R A typical low-rate DDoS attack pattern The terminology stealthy DDoS attacks proposed in this paper mainly refers to shrew DDoS attacks and slowlyincreasing-intensity DDoS attacks (SIDA). The shrew DDoS attacks were firstly introduced in [7], which was followed by a series of related research [], [], [6]. Generally, a shrew DDoS attack refers to a periodic, pulsing, and low-rate attack traffic embedded in TCP or UDP flows. A typical low-rate DDoS attack is illustrated as a periodic waveform shown in Attack Intensity Initial Intensity I Fig.. Period Of BurstT Increment I A generic example of slowly-increasing-intensity DDoS attack pattern Fig., where T is the time period of an attack, L is the length of a burst period, and R is the burst rate. We consider the shrew DDoS attacks as a subclass of general stealthy DDoS attacks. In this paper, our research focuses on the latter one, which can be launched by a patient, intelligent attacker in no great rush. Fig. shows a generic example of a slowly-increasingintensity DDoS attack, where the parameter I means the initial intensity of the attack traffic, T is the length of the period of burst and I is the increment of the attack intensity each time. The value of I can be manipulated by a smart attacker and be controlled within a very small range to hide the attack behavior. The overview of the SIDA curve is slowly-increasing scalariform. That means the sophisticated hacker can stealthily enhance the threshold for judging legitimate traffic and thus defeat those previous detection methods that detect based on thresholds. This type of DDoS attacks is even more dangerous than those traditional attacks because it is harder to detect, especially when embedded in a large amount of traffic, and thus can greatly delay the anomaly detection. To the best of our knowledge, none of the previous research focus on the detection of SIDA. In order to detect the new attack type, a new approach needs to be employed. III. INTERNET TRAFFIC ANALYSIS The Internet traffic is complex network flows with strong outburst and instability. In this paper, we sample the flow connection entropy (FCE) series from the Internet traffic. By calculating the distribution of the FCE series, we can obtain a coarse-grained estimation of the traffic. We define FCE, which reflects the change of the flow distribution caused by DDoS attacks, as follows. Definition A flow f i is a 3-tuple {sip i, dip i, dport i }, where sip i represents source IP address, dip i destination IP address, and dport i destination port number. This definition of flow can reflect main characteristics of DDoS attack traffic, because a typical DDoS attack pattern is that each zombie machine from a BotNet launches one connection to target at a certain service port of one or more victim machines. Definition The flow connection entropy (FCE) of a set of flows is defined as FCE = n p(f i ) log p(f i ) () i= where p(f i ) is the probability of receiving a packet belonging to flow f i. During certain time period t, we consider the frequency of the packets belonging to f i as the estimation of p(f i ). From the definitions, we can see that a DDoS attack will result in an abnormal increase in the FCE of the network traffic.
3 k (a) Normal k traffic k k Fig. 3. (b) Traffic with SIDA attacks s of normal and anomalous traffic A. Statistical Property of FCE Series We sample network traffic with sampling period t and calculate FCE of every interval. Therefore, the packet arrivals are modeled by FCE time series: Z(N, t) = {F CE i, i =,,..., N}, where N is the length of the time series. The kth order auto-correlation coefficient of the series Z is then defined as: ρ k = (FCE i FCE)(FCE i+k FCE) N k i= () N (FCE i FCE) i= where FCE is the mean of FCE series. We then obtain the double auto-correlation (DA) coefficient ρ k by re-calculating auto-correlation coefficient of the original auto-correlation coefficient series. Fig. 3(a) shows the DA coefficient of normal traffic. From that result, we can see that ρ k is near when the order k is larger than. If FCE is stationary, ρ k should decay rapidly as k increases [7]. Otherwise, ρ k fluctuates as k increases. Since ρ k in Fig. 3(a) stabilizes as k increases, we can conclude that the FCE series for the normal traffic are stationary. That is to say, for the normal network traffic FCE series at present time is independent of the previous network status. However, the DA coefficient of normal traffic with injected SIDA traffic, shown in Fig. 3(b), is much larger than even when the order k is greater than. Besides, its value decreases in a very slow pace. Clearly, the injected attack traffic makes the FCE series of network traffic non-stationary. Thus, the traditional autoregressive (AR) model does not perform well. B. Decomposition Model of Short-Term Traffic Today s Internet traffic depends on many factors, such as user behavior, network architecture, and unexpected accidents, which make the network traffic contain both stationary and non-stationary components. According to a study conducted by Guang et al. [8], generally the long time-scale traffic exhibit the characteristics of trend, period, mutation, and randomness. Specifically, they divided the large-timescale time series such Fig. 4. Original FCE series Series decomposition Trend component Random component Double autocorrelation Non-parametric CUSUM Alert Decision module Structure and process of detection based on time series decomposition as FCE i into trend component A i, period component P i, mutation component B i, and random component R i. Therefore, for long time-scale traffic, it can be modeled as: FCE i = A i + P i + B i + R i (3) where A i and P i belong to long-term changes which represents the smooth process of network traffic behavior while B i and R i belong to short-term changes reflecting uncertainty in network traffic. In order to come up with a real-time detection algorithm which can be executed in an incremental way, we introduce a sliding window into our algorithm. Generally, the size of the sliding window should be kept small ( minutes in our implementation) to adapt to real-time detection requirements. With larger window size, more memory resources will be consumed. For a short period of time, we claim that the mutation component and the period component are negligible. In other words, the network traffic within the window can be considered as the consequence of the interaction between the trend component and random component only. This assumption greatly simplifies the real-time detection algorithm and makes our approach more practical. Under this assumption, the FCE series is modeled as { FCE i = FCE i + R i (4) R i = η i + ε i where FCE i denotes the trend component, R i is the random component containing η i and ε i, which represents the steady random component and the measurement error (white noise) component, respectively. The value of ε i can reflect the absolute error between the prediction sequence and the measured sequence. Fig. 4 demonstrates the overview of the detection process based on the time series decomposition method. Given a series of FCE data, we first obtain the trend and random components by decomposition of the series. Then, anomaly detection methods are applied to each component separately. Results are collected at the decision module to make a comprehensive decision. Because each anomaly detection method has its own strength under certain conditions, the proposed synthetic approach has a potential to be more effective than previous approaches in detecting SIDA and general DDoS attacks. We use a modified exponentially weighted moving average (EWMA) to produce estimate the trend component. The current estimation of FCE is obtained by combining the current FCE with the FCE from the previous period corrected for trend 3
4 as follows: FCE i = α i FCE i + ( α i )FCE i α i = α max ( e Cβi ) β i = FCE i FCE i FCE i where β i reflects the extent of the fluctuation. Generally, if FCE series are subject to large changes, then the proportion of the history should be small so as to quickly attenuate the effect of old observations. In contrast, when FCE series smoothly change as time goes, the proportion of the history should be large to minimize random variations. The value of the parameter C is determined empirically through experiments. After we subtract the long-term trend component from the original series, the remainder of the series can be considered as the random part of the traffic. Hence, the estimated steady random series is obtained from () R i = FCE i FCE i. (6) C. Anomaly Detection of Each Component By decomposing the FCE series, the trend component will reflect the majority of slowly-increasing signal while the steady random signal is contained in the random component. After we decompose the original series into two separate components, appropriate approaches will be applied to each component separately. Conventional approaches can perform well in detecting anomaly with certain properties. For instance, the cumulative sum (CUSUM) technique, which is based on the Sequential Change Point Detection [9], can determine whether the observed time series is statistically homogeneous, and find the time when the change occurs. However, its effectiveness will be weakened when the network signal contains a large proportion of increasing- or declining-intensity signals, because those signals may result in statistical bias, causing false positives. In our approach, we apply the non-parametric CUSUM method [] to the random component, which has all the advantages of sequential and non-parametric tests with light computational overhead. For the trend component, we calculate the double autocorrelation coefficient series and examine the first K max elements in that series. If the signal in the trend component has an evident increasing or declining tendency, then those values of the first few elements will all exceed certain threshold. Generally, since the window size used in our algorithm is small, the normal trend series should exhibit little fluctuation as time goes. The calculation of the auto-correlation coefficient series can be implemented in an incremental manner. IV. DDOS DETECTION ALGORITHM The important performance metrics of DDoS detection include detection accuracy and detection latency. However, it is impossible to reduce both at the same time; we need to find out an appropriate trade-off between the two metrics. A. Self-Adaptive CUSUM Technique for Random Component In order to accurately and timely detect the mutation point of random series R, we adopt the CUSUM technique in our approach. The basic idea of CUSUM is to accumulate those small offsets during the process to amplify the varying statistical feature and thus improve the detection sensitivity. CUSUM can detect a small deviation of the mean effectively. It is generally defined as: { yi = (y i + x i ) + (7) y = where x i is the observed original value and + is if > and otherwise. When x i becomes positive from a negative value, y i becomes larger, and its exceeding a threshold TH CUSUM indicates the change point of the original series. In our implementation, we use R i = R i R H as the original series, where R H is the upper bound of R i series during normal process. Although the original CUSUM algorithm can quickly and efficiently detect attacks, after an attack period ends, the alarm will remain active. To stop the alarm, we consider the attack is over if y i does not grow for C AttackEnd t. When the alarm stops, we reset y i to. B. Double Autocorrelation Technique for Trend Component As shown in Fig. 3(b), the double autocorrelation coefficient can be used as an indicator of the existence of SIDA in network traffic; the injected SIDA traffic increases the double autocorrelation coefficient. It results from the high internal dependency of SIDA traffic. The FCE series obtained from the same traffic also exhibit this property. Based on these observations, we can detect the anomaly in the trend component using the following condition: ρ k(i) > TH DA, k K max (8) where ρ k (i) is the double autocorrelation coefficient series at phase i. If all the first K max elements of the double autocorrelation coefficient series (except the very first element which always equals to ) exceed the threshold TH DA, then we conclude that there is SIDA traffic embedded in the traffic. Considering the fact the SIDA traffic is injected to the normal traffic in a very slow pace, another condition should be introduced in order to detect the SIDA traffic at an early stage. During θ t period, if the sum of the first K max element (except the very first one) keeps growing C DA θ times, then we consider a SIDA attack is initialized by attackers as follows: i j=i θ+ { Kmax k= ρ k(j) > K max k= ρ k(j ) } C DA θ (9) where C DA is an empirically-determined constant. The above condition can be checked by the following way. We firstly compare the sum of the first K max element of the double autocorrelation coefficient series at phase i θ + with that at phase i θ +. If the former is greater than latter, then will 4
5 be accumulated into the left side of the formula, otherwise. If the cumulated value during the previous θ phase is greater than C DA θ, then an anomaly is indicated. C. Adaptive Sliding Window We use an adaptive size sliding windows into our algorithm, which means the size of the introduced window can be automatically adjusted according to the current network traffic condition. An adaptive sliding window is necessary for improving the performance of the proposed algorithm. Intuitively, when the double autocorrelation coefficient becomes larger than those in previous phases, the window size should be enlarged so as to capture a more obvious increasing or declining trend. Therefore, the following ratio R RA can represent that trend. R i RA = K max k= K max k= ρ k (i) ρ k (i ) () For the random component, the CUSUM technique does not require a specific length of the time series; however, the window size can be smaller in order to reduce the detecting latency. The initial size of the sliding window is denoted by L. Every time the window slides forward, the size of the window changes. Based on the discussion above, the size of the adaptive sliding window is adjusted as follows: { Li + C L i = R i DA C if L i L otherwise L () where C and C are both positive integers, which can be optimally determined by experiments. D. Overall Algorithm Description Based on the above discussions, the proposed algorithm can be described as follows. After initializing those values of parameters, we sample the initial FCE series with window length L. Then, we decompose the FCE series inside the window by the improved EWMA technique proposed in the previous section. The following flow contains two branches. That is to separately apply the DA and CUSUM techniques to trend component and random component, respectively. Note that the value of y i needs to be reset to when the attack terminates. If one of these two branches detects an anomaly, then an appropriate attack type will be reported. After computing the next L i L i + FCE series, the sliding window advances to the next, and then the algorithm repeats. As we can see, all of the techniques adopted in this algorithm can be implemented using simple processes and small computing resource. Traffic (Byte) FCE series Trend Random DA alarm CUSUM alarm Overall alarm Ground truth x Fig.. Traffic characteristic of tested trace Fig. 6. Detection result compared with ground truth V. EVALUATION We use actual network traffic downloaded from the MIT Lincoln Laboratory [] to evaluate our approach. The traffic we tested is synthetically generated by merging the attack traffic and the normal traffic. We developed our own tool to generate the SIDA traffic, and the increasing rate is adjustable. The duration of one SIDA was normally distributed with mean minutes and variance. The attack traffic was periodically generated and the duration of the period was exponentially distributed, with mean 6 minutes. General outburst-like SYN flood attack traffic was also injected into the tested trace, and the duration of each outburst followed the normal distribution with mean seconds and variance seconds. The interval between each outburst was exponentially distributed with mean seconds. From Fig., we can see that the merged traffic (top) seems to be normal, especially when we compare the traffic volume with the ground truth shown in Fig. 6. We considered the detection accuracy and the detection latency as the main performance metrics. Here, the detection accuracy contains two aspects: false positive ratio (FPR) and false negative ratio (FNR). Unless otherwise noted, the default setting for the parameters we adopted in our experiment were t = s for sampling FCE series, α max =.4, C = for time series decomposition, C AttackEnd = 3, TH CUSUM = for CUSUM technique detection, K max = 6, TH DA =.4, C DA =.8, θ = 3 for DA technique, and L =, C = 3, C = for the adaptive sliding window. Fig. shows that after we calculated the FCE series, the
6 SIDA attack can be greatly amplified from the background traffic. Hence, several periodical SIDA attacks are observed from the FCE series. Such slowly-increasing trends are more obvious when we apply the time series decomposition approach into the original FCE series. Several strong long-period tendencies are observed from the trend component, and it provides the basis for the DA technique to detect its high internal correlation. Concerning the random component, those outbursts, which indicates general DDoS attack stream, can be quickly detected by the improved CUSUM technique. Fig. 6 shows the detection result of experiments, which was demonstrated in the same time period as Fig. for comparison. We use alarm series to represent our detecting result, of which the value is when an attack is detected and otherwise. From Fig. 6, nearly all the SIDA can be detected in a very early stage. The average of the detection latency for those SIDAs in our experiment is around 3 seconds, which is very small when compared with the 9 seconds whole period of SIDA. Compare with the ground truth series, the overall FPR in our experiment is around 4.3% and the overall FNR is around 9.8%. Higher accuracy is achievable by finding a better combination of those parameter values, which is still our ongoing work. VI. CONCLUSION In this paper, we introduce a new type of DDoS attacks called stealthy DDoS attacks, which can be launched by a sophisticated attacker. Such attacks are different from traditional DDoS attacks and cannot be easily detected by traditional detection methods. For this type of DDoS attacks, we propose a detection approach based on the decomposition of time series, which divides the time series into trend and steady random components. We then analyze different components to detect the anomaly in both long-term and short-term changes of the traffic. By analyzing each component separately and evaluating results synthetically, the approach can greatly reduce both false negatives and false positives. Furthermore, to make our method more generally applicable, we apply the adaptive sliding window to our approach. The experimental results using real Internet traces show the effectiveness of this approach. REFERENCES [] J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communication Review, vol. 34, no., pp. 39 3, Apr 4. [] Chang and R.K.C., Defending against flooding-based distributed denialof-service attacks: a tutorial, IEEE Communications Magazine, vol. 4, no., pp. 4, Oct. [3] D. Moore, G. M. Voelker, and S. Savage, Inferring internet denial-ofservice activity, in Proceedings of USENIX Security,. [4] T. Aura, P. Nikander, and J. Leiwo, DoS-resistant authentication with client puzzles, Lecture Notes In Computer Science, vol. 33, pp. 7 77,. [] C. Y. W, H. K. S, and H. T. Y, Study on the prevention of SYN flooding by using traffic policing, in Proceedings of Network Operations and Management Symposium, Hawaii, Apr, pp [6] J. D. Brutlag, Aberrant behavior detection in time series for network monitoring, in Proceedings of LISA XIV, Dec. [7] A. Kuzmanovic and E. Knightly, Low-rate TCP-Targeted denial of service attacks. (the shrew vs. the mice and elephants), in Proceedings of SIGCOMM, 3. [8] C. Cheng, H. Kung, and K. Tan, Use of spectral analysis in defense against DoS attacks, in Proceedings of IEEE GLOBECOM, Taipei, China,. [9] Y. Chen and K. Hwang, Collaborative detection and filtering of shrew DDoS attacks using spectral analysis, Journal of Parallel and Distributed Computing, vol. 66, no. 9, pp. 37, Sep 6. [] X. Luo and R. K. Chang, On a new class of pulsing denial-of-service attacks and the defense, in Proceedings of Network and Distributed System Security Symposium, San Diego, CA, Feb. [] K. Lu, D. Wu, and J. Fan, Robust and efficient detection of DDoS attacks for large-scale internet, Computer Networks: The International Journal of Computer and Telecommunications Networking, vol., no. 8, pp. 36 6, Dec 7. [] M. Handley, Internet architecture WG: DoS-resistant internet subgroup report, Tech. Rep., Tech. Rep.,. [3] A. Lakhina, M. Crovella, and C. Diot, Diagnosing network-wide traffic anomalies, in SIGCOMM 4: Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communications, Portland, Oregon, USA, 4, pp [4], Mining anomalies using traffic feature distributions, in SIG- COMM : Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communications, Philadelphia, Pennsylvania, USA,, pp [] M. Guirguis, A. Bestavros, and I. Matta, Exploiting the transients of adaptation for RoQ attacks on internet resources, in Proceedings of IEEE ICNP, Berlin, Germany, Oct 4, pp [6] S. Ebrahimi-Taghizadeh, A. Helmy, and S. Gupta, TCP vs. TCP: a systematic study of adverse impact of short-lived TCP flows on longlived TCP flows, in Proceedings of IEEE INFOCOM, Miami, USA, Mar, pp [7] J. D. Hamilton, Time Series Analysis. Princeton University Press, 994. [8] C. Guang, G. Jian, and D. Wei, A time-series decomposed model of network traffic, Lecture Notes in Computer Science, pp ,. [9] M. Basseville and I. V. Nikiforov, Detection of Abrupt Changes : Theory and Application. Prentice Hall, 993. [] B. Brodsky and B. Darkhovsky, Nonparametric Methods in Changepoint Problems. Kluwer Academic Publishers, 993. [] J. W. Haines, R. P. Lippmann, D. J. Fried, M. A. Zissman, E. Tran, and S. B. Boswell, 999 DARPA intrusion detection evaluation: Design and procedures, Lincoln Laboratory, Massachusetts Institute of Technology, Lexington, Massachusetts, U.S.A., Tech. Rep. 6, Feb.. 6
A COLLABORATIVE DEFENSE FRAMEWORK AGAINST DDOS ATTACKS IN NETWORKS
A COLLABORATIVE DEFENSE FRAMEWORK AGAINST DDOS ATTACKS IN NETWORKS By HAIQIN LIU A dissertation submitted in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY WASHINGTON STATE
Fine-Grained DDoS Detection Scheme Based on Bidirectional Count Sketch
Fine-Grained DDoS Detection Scheme Based on Bidirectional Count Sketch Haiqin Liu, Yan Sun, and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington
Denial of Service and Anomaly Detection
Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece [email protected] SCAMPI BoF, Zagreb, May 21 2002 Overview! What the problem is and
Orchestration and detection of stealthy DoS/DDoS Attacks
Orchestration and detection of stealthy DoS/DDoS Attacks Mohammedshahzan A Mulla 1, Asst prof Shivraj V B 2 Mtech - Dept. of CSE CMRIT Bangalore. Abstract The accomplishment of the cloud computing model
An Efficient Filter for Denial-of-Service Bandwidth Attacks
An Efficient Filter for Denial-of-Service Bandwidth Attacks Samuel Abdelsayed, David Glimsholt, Christopher Leckie, Simon Ryan and Samer Shami Department of Electrical and Electronic Engineering ARC Special
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Time-Frequency Detection Algorithm of Network Traffic Anomalies
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore Time-Frequency Detection Algorithm of Network Traffic Anomalies
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
Multi-Channel DDOS Attack Detection & Prevention for Effective Resource Sharing in Cloud
Multi-Channel DDOS Attack Detection & Prevention for Effective Resource Sharing in Cloud 1 J. JANCYRANI, 2 B. NITHIA 1 PG scholar, Department Of Computer Science and Engineering, Surya school of engineering
DDoS Attacks and Defenses Overview
DDoS Attacks and Defenses Overview Pedro Pinto 1 1 ESTG/IPVC Escola Superior de Tecnologia e Gestão, Intituto Politécnico de Viana do Castelo, Av. do Atlântico, 4900-348 Viana do Castelo, Portugal [email protected]
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Detecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds
Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds S.Saranya Devi 1, K.Kanimozhi 2 1 Assistant professor, Department of Computer Science and Engineering, Vivekanandha Institute
TrustGuard: A Flow-level Reputation-based DDoS Defense System
TrustGuard: A Flow-level Reputation-based DDoS Defense System Haiqin Liu, Yan Sun, Victor C. Valgenti, and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS Nita V. Jaiswal* Prof. D. M. Dakhne** Abstract: Current network monitoring systems rely strongly on signature-based and supervised-learning-based
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System 1 M.Yasodha, 2 S. Umarani 1 PG Scholar, Department of Information Technology, Maharaja Engineering College,
Discriminating DDoS Attack Traffic from Flash Crowd through Packet Arrival Patterns
The First International Workshop on Security in Computers, Networking and Communications Discriminating DDoS Attack Traffic from Flash Crowd through Packet Arrival Patterns Theerasak Thapngam, Shui Yu,
Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 211 proceedings Quick Detection of Stealthy SIP Flooding Attacks
Efficient Detection of Ddos Attacks by Entropy Variation
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Signal Processing Methods for Denial of Service Attack Detection
0 Signal Processing Methods for Denial of Service Attack Detection Urbashi Mitra Ming Hsieh Department of Electrical Engineering Viterbi School of Engineering University of Southern California Los Angeles,
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
MODELING OF SYN FLOODING ATTACKS Simona Ramanauskaitė Šiauliai University Tel. +370 61437184, e-mail: [email protected]
MODELING OF SYN FLOODING ATTACKS Simona Ramanauskaitė Šiauliai University Tel. +370 61437184, e-mail: [email protected] A great proportion of essential services are moving into internet space making the
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System
Detection of DDoS Attack Using Virtual Security N.Hanusuyakrish, D.Kapil, P.Manimekala, M.Prakash Abstract Distributed Denial-of-Service attack (DDoS attack) is a machine which makes the network resource
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
Intrusion Forecasting Framework for Early Warning System against Cyber Attack
Intrusion Forecasting Framework for Early Warning System against Cyber Attack Sehun Kim KAIST, Korea Honorary President of KIISC Contents 1 Recent Cyber Attacks 2 Early Warning System 3 Intrusion Forecasting
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
Time Series Analysis of Network Traffic
Time Series Analysis of Network Traffic Cyriac James IIT MADRAS February 9, 211 Cyriac James (IIT MADRAS) February 9, 211 1 / 31 Outline of the presentation Background Motivation for the Work Network Trace
Low-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1167-1173 International Research Publications House http://www. irphouse.com Vulnerability
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee USENIX Security Symposium (Security 07) Presented by Nawanol
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
An Intelligent DDoS Attack Detection System Using Packet Analysis and Support Vector Machine
An Intelligent DDoS Attack Detection System Using Packet Analysis and Support Vector Machine Keisuke Kato, Vitaly Klyuev Department of Computer Science and Engineering The University of Aizu, Japan Abstract
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
INTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla [email protected] Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
Detect and Notify Abnormal SMTP Traffic and Email Spam over Aggregate Network
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 571-578 (2005) Short Paper Detect and Notify Abnormal SMTP Traffic and Email Spam over Aggregate Network Department of Computer Science and Information
Obfuscation of sensitive data in network flows 1
Obfuscation of sensitive data in network flows 1 D. Riboni 2, A. Villani 1, D. Vitali 1 C. Bettini 2, L.V. Mancini 1 1 Dipartimento di Informatica,Universitá di Roma, Sapienza. E-mail: {villani, vitali,
Methodologies for detecting DoS/DDoS attacks against network servers
Methodologies for detecting DoS/DDoS attacks against network servers Mohammed Alenezi School of Computer Science & Electronic Engineering University of Essex name Colchester, UK [email protected] Martin
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
Botnet Detection by Abnormal IRC Traffic Analysis
Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National
Joint Entropy Analysis Model for DDoS Attack Detection
2009 Fifth International Conference on Information Assurance and Security Joint Entropy Analysis Model for DDoS Attack Detection Hamza Rahmani, Nabil Sahli, Farouk Kammoun CRISTAL Lab., National School
Network Security. Mobin Javed. October 5, 2011
Network Security Mobin Javed October 5, 2011 In this class, we mainly had discussion on threat models w.r.t the class reading, BGP security and defenses against TCP connection hijacking attacks. 1 Takeaways
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
Network Traffic Anomalies Detection and Identification with Flow Monitoring
Network Traffic Anomalies Detection and Identification with Flow Monitoring Huy Anh Nguyen, Tam Van Nguyen, Dong Il Kim, Deokjai Choi Department of Computer Engineering, Chonnam National University, Korea
Large-Scale IP Traceback in High-Speed Internet
2004 IEEE Symposium on Security and Privacy Large-Scale IP Traceback in High-Speed Internet Jun (Jim) Xu Networking & Telecommunications Group College of Computing Georgia Institute of Technology (Joint
Detecting Flooding Attacks Using Power Divergence
Detecting Flooding Attacks Using Power Divergence Jean Tajer IT Security for the Next Generation European Cup, Prague 17-19 February, 2012 PAGE 1 Agenda 1- Introduction 2- K-ary Sktech 3- Detection Threshold
An Efficient and Reliable DDoS Attack Detection Using a Fast Entropy Computation Method
An Efficient and Reliable DDoS Attack Detection Using a Fast Entropy Computation Method Giseop No and Ilkyeun Ra * Department of Computer Science and Engineering University of Colorado Denver, Campus Box
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
A Novel Technique for Detecting DDoS Attacks at Its Early Stage
A Novel Technique for Detecting DDo Attacks at Its Early tage Bin Xiao 1, Wei Chen 1,2, and Yanxiang He 2 1 Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong {csbxiao,
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Predict the Popularity of YouTube Videos Using Early View Data
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
An Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, [email protected]
International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612
Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks S. Bhava Dharani, P. Kumar Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamilnadu,
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring Tao Peng, Christopher Leckie, and Kotagiri Ramamohanarao ARC Special Research Center for Ultra-Broadband Information
Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: [email protected] Abstract A Controller-Agent
A Flow-based Method for Abnormal Network Traffic Detection
A Flow-based Method for Abnormal Network Traffic Detection Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong Dept. of Computer Science and Engineering POSTECH {mount,
Characteristics of Network Traffic Flow Anomalies
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic
The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network
, pp.67-76 http://dx.doi.org/10.14257/ijdta.2016.9.1.06 The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network Lihua Yang and Baolin Li* School of Economics and
Robust Execution Of Packet Flow In Routers To Prevent Ddos Attack Using Trace Back
Journal of Recent Research in Engineering and Technology 3(1), 2016, pp7-19 Article ID J11602 ISSN (Online): 2349 2252, ISSN (Print):2349 2260 Bonfay Publications, 2016 Research Article Robust Execution
V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks
Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
MODELLING OF CENTRAL PROCESSING UNIT WORK DENIAL OF SERVICE ATTACKS
MODELLING OF CENTRAL PROCESSING UNIT WORK DENIAL OF SERVICE ATTACKS Simona Ramanauskaite 1, Antanas Cenys 2 1 Siauliai University, Department of Information Technology, Vilniaus st. 141, Siauliai, Lithuania,
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
