Traceback of DDoS Attacks using Entropy Variations
#1

Traceback of DDoS Attacks using Entropy Variations


.pdf   Traceback of DDoS Attacks using Entropy.pdf (Size: 368.76 KB / Downloads: 14)

INTRODUCTION

IT is an extraordinary challenge to traceback the source of
Distributed Denial-of-Service (DDoS) attacks in the
Internet. In DDoS attacks, attackers generate a huge amount
of requests to victims through compromised computers
(zombies), with the aim of denying normal service or
degrading of the quality of services. It has been a major threat
to the Internet since year 2000, and a recent survey [1] on the
largest 70 Internet operators in the world demonstrated that
DDoS attacks are increasing dramatically, and individual
attacks are more strong and sophisticated. Furthermore, the
survey also found that the peak of 40 gigabit DDoS attacks
nearly doubled in 2008 compared with the previous year. The
key reason behind this phenomena is that the network security
community does not have effective and efficient traceback
methods to locate attackers as it is easy for attackers to
disguise themselves by taking advantages of the vulnerabilities
of the World Wide Web, such as the dynamic, stateless, and
anonymous nature of the Internet [2],[3].


BACKGROUND AND RELATED WORK
A. Background of DDoS Attacks


DDoS attacks are targeted at exhausting the victim's
resources, such as network bandwidth, computing power, and
operating system data structures. To launch a DDoS attack, the
attacker(s) first establishes a network of computers that will
be used to generate the huge volume of traffic needed to deny
services to legitimate users of the victim. To create this attack
network, attackers discover vulnerable hosts on the network.
Vulnerable hosts are those that are either running no antivirus
or out-of-date antivirus software, or those that have not been
properly patched. These are exploited by the attackers who
use the vulnerability to gain access to these hosts. The next
step for the attacker is to install new programs (known as
attack tools) on the compromised hosts of the attack network.
The hosts running these attack tools are known as zombies,
and they can be used to carry out any attack under the control
of the attacker. Numerous zombies together form an army or
botnet [3], [35].


SYSTEM MODELING FOR IP TRACEBACK ON ENTROPY
VARIATIONS
A. A Sample Network with DDoS Attacks


In order to clearly describe our traceback mechanism, we use
Fig. 1 as a sample network with DDoS attacks to demonstrate
our traceback strategy.
In a DDoS attack scenario as shown in Fig. 1, the flows with
destination as the victim include legitimate flows, such as f3,
and a combination of attack flows and legitimate flows, such
as f1 and f2. Compared with non-attack cases, the volumes of
some flows increase significantly in a very short time period
in DDoS attack cases. Observers at routers R1, R4, R5 and V
will notice the dramatic changes, however, the routers who are
not in the attack paths, such as, R2 and R3, will not be able to
sense the variations. Therefore, once the victim realizes an
ongoing attack, it can pushback to the LANs which caused the
changes based on the information of flow entropy variations,
and therefore, we can identify the locations of attackers.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: video compression using entropy coding in matlab code, ieee projects traceback of ddos attack using entropy variations with code, ip traceback seminar reports, dynamic programming traceback blosum62, java code for ip traceback in network systems, ip traceback ns2, meca maximum entropy clustering algorithm matlab,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  BUFFER OVERFLOW ATTACKS seminar addict 1 855 05-03-2012, 12:02 PM
Last Post: seminar paper
  Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures seminar addict 1 1,428 16-02-2012, 04:06 PM
Last Post: seminar paper
  Detecting SYN Flooding Attacks project uploader 0 685 10-02-2012, 04:05 PM
Last Post: project uploader
  Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks seminar paper 0 722 09-02-2012, 12:57 PM
Last Post: seminar paper
  Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks seminar addict 0 894 20-01-2012, 11:20 AM
Last Post: seminar addict

Forum Jump: