Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Detection Techniques of DOS/DDOS/DRDOS Attacks in Networks of Mass Service

1G. Shangytbayeva, 2G. Kazbekova, 3U. Imanbekova, 3S. Munsyzbaeva and 4N. Shangytbayev
1K. Zhubanov Aktobe Regional State University, Aktobe 030000, Kazakhstan
2Kazakh-Russian International University, Aktobe 030000, Kazakhstan
3Kazakh National Technical University Named After K.I. Satpayev, Almaty 050013, Kazakhstan
4Aktobe Polytechnic College, Aktobe 030000, Kazakhstan
Research Journal of Applied Sciences, Engineering and Technology   2015  12:1420-1424
http://dx.doi.org/10.19026/rjaset.10.1843  |  © The Author(s) 2015
Received: April ‎7, ‎2015  |  Accepted: April ‎22, ‎2015  |  Published: August 25, 2015

Abstract

The study describes the basic network attacks such as "denial of service", algorithm of operation of malefactors with attacks of this type, techniques of detection of DOS/DDOS/DRDOS attacks in networks of mass service. For detection of DDoS-attacks is offered the valuation method of probability of loss of arbitrary request in case of its passing on networks of mass service. Developed the architecture and constructed program implementation of system of detection of DDoS-attacks. The developed technique allows to receive an adequate assessment of frequency of loss of requests on a network if the network of mass service is in the stationary mode.

Keywords:

Denial of service attacks, detection of network attacks, distributed denial of service attacks, mass service, networked and distributed attacks,


References

  1. Apiecionek, L., J.M. Czerniak and W.T. Dobrosielski, 2015. Quality of services method as a DDoS protection tool. Adv. Intel. Sys. Comput., 323: 225-234.
    CrossRef    
  2. Bhatia, S., D. Schmidt, G. Mohay and A. Tickle, 2014. A framework for generating realistic traffic for distributed denial-of-service attacks and flash events. Comput. Secur., 40: 95-107.
    CrossRef    
  3. Bhuyan, M.H., D.K. Bhattacharyya and J.K. Kalita, 2015. An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recogn. Lett., 51: 1-7.
    CrossRef    
  4. Bu, T., S. Norden and T. Woo, 2004. Trading resiliency for security: Model and algorithms. Proceeding of the 12th IEEE International Conference on Network Protocols, pp: 218-227.
  5. Dean, D., M. Franklin and A. Stubble?eld, 2001. An algebraic approach to IP traceback. Proceeding of the Network and Distributed System Security Symposium (NDSS), pp: 3-12.
  6. Denial-of-Service Attack, 2015. Wikipedia, the Free Encyclopedia. Retrieved from: http://en.wikipedia.org/wiki/Denial-of-service_attack. (Accessed on: February 2, 2015).
    Direct Link
  7. Elliott, J., 2000. Distributed denial of service attacks and the zombie ant effect. IT Professional, 2(2): 55-57.
    CrossRef    
  8. Hautio, J. and T. Weckstrom, 1999. Denial of Service Attacks. Retrieved from: http://www.hut.Fi/u/tweckstr/hakkeri/DoSpaper.html.
    Direct Link
  9. Hussain, A., J. Heidemann and C. Papadopoulos, 2003. A framework for classifying denial of service attacks. Proceeding of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications SIGCOMM, 2003. Karlsruhe, Germany, pp: 99-110.
    CrossRef    PMid:12887285    
  10. Ioannidis, J. and S.M. Bellovin, 2002. Implementing pushback: Router-based defense against DDoS attacks. Proceeding of the Network and Distributed System Security Symposium (NDSS, 2002). Reston, VA, USA, pp: 100-108.
  11. Lee, G., 2000. Denial-of-Service attacks rip the internet. Computer, 33(4): 12-17.
    CrossRef    
  12. Li, M., M. Li and X. Jiang, 2008. DDoS attacks detection model and its application. WSEAS T. Comput., 7(8): 1159-1168.
  13. Özçelik, I. and R. Brooks, 2014. Deceiving entropy based DoS detection. Comput. Secur., 48: 234-245.
    CrossRef    
  14. Szczerba, E.V. and M.V. Szczerba, 2012. Development of the system architecture of distributed detection of network attacks such as "Denial of Service". Sci. Herald Omsk. Ser. Appl. Mach. Technol., 3(113): 280-283.
  15. Szczerba, E.V. and D.A. Volkov, 2013. Development of the system architecture of distributed detection of network attacks such as "Denial of Service". Appl. Discrete Math. Appl., pp: 68-70.
  16. Wang, J. and A.A. Chien, 2003. Using overlay networks to resist denial of service attacks. Proceeding of the ACM Conference on Computer and Communucation Security.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved