Resistance is not futile: Detecting DDoS attacks without packet inspection

5Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Packets in anonymous networks are fully protected. Therefore, traditional methods relying on packet header and higher layer information do not work to detect Distributed-Denial-of-Service (DDoS) attacks in anonymous networks. In this paper we propose to use observable statistics at routers that need no packet inspection to infer the presence of an attack. We propose packet resistance as a metric to detect the presence of attacks which reduce the availability of channel bandwidth for wireless routers in the core network. Our proposed detection framework is distributed, wherein each router in the network core monitors and reports its findings to an intermediate router. These intermediate routers form a hierarchical overlay to eventually reach a centralized attack monitoring center. The alarm messages are used to construct an attack path and determine the origin of the attack. We present simulation results to demonstrate the effectiveness of our proposed metric. © 2014 Springer International Publishing Switzerland.

Cite

CITATION STYLE

APA

Athreya, A. P., Wang, X., Kim, Y. S., Tian, Y., & Tague, P. (2014). Resistance is not futile: Detecting DDoS attacks without packet inspection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8267 LNCS, pp. 174–188). Springer Verlag. https://doi.org/10.1007/978-3-319-05149-9_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free