File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Filtering of shrew DDoS attacks in frequency domain

TitleFiltering of shrew DDoS attacks in frequency domain
Authors
KeywordsDigital signal processing (DSP)
Distributed denial of service (DDoS)
Internet traffic analysis
Network security
Reduction of quality (RoQ)
Issue Date2005
PublisherIEEE, Computer Society. The Journal's web site is located at http://www.ieee.org
Citation
Proceedings - Conference On Local Computer Networks, Lcn, 2005, v. 2005, p. 786-793 How to Cite?
AbstractThe shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks could be even more detrimental than the widely known flooding DDoS attacks because they damage the victim servers for a long time without being noticed, thereby denying new visitors to the victim servers, which are mostly e-commerce sites. Thus, In order to minimize the huge monetary losses, there is a pressing need to effectively detect such attacks in real-time. Unfortunately, effective detection of shrew attacks remains an open problem. In this paper, we meet this challenge by proposing a new signal processing approach to identifying and detecting the attacks by examining the frequency-domain characteristics of incoming traffic flows to a server. A major strength of our proposed technique is that its detection time is less than a few seconds. Furthermore, the technique entails simple software or hardware implementations, making it easily deployable in a real-life network environment. © 2005 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/45910
ISSN
2019 SCImago Journal Rankings: 0.125
References

 

DC FieldValueLanguage
dc.contributor.authorChen, Yen_HK
dc.contributor.authorHwang, Ken_HK
dc.contributor.authorKwok, YKen_HK
dc.date.accessioned2007-10-30T06:38:18Z-
dc.date.available2007-10-30T06:38:18Z-
dc.date.issued2005en_HK
dc.identifier.citationProceedings - Conference On Local Computer Networks, Lcn, 2005, v. 2005, p. 786-793en_HK
dc.identifier.issn0742-1303en_HK
dc.identifier.urihttp://hdl.handle.net/10722/45910-
dc.description.abstractThe shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks could be even more detrimental than the widely known flooding DDoS attacks because they damage the victim servers for a long time without being noticed, thereby denying new visitors to the victim servers, which are mostly e-commerce sites. Thus, In order to minimize the huge monetary losses, there is a pressing need to effectively detect such attacks in real-time. Unfortunately, effective detection of shrew attacks remains an open problem. In this paper, we meet this challenge by proposing a new signal processing approach to identifying and detecting the attacks by examining the frequency-domain characteristics of incoming traffic flows to a server. A major strength of our proposed technique is that its detection time is less than a few seconds. Furthermore, the technique entails simple software or hardware implementations, making it easily deployable in a real-life network environment. © 2005 IEEE.en_HK
dc.format.extent474863 bytes-
dc.format.extent3564 bytes-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypetext/plain-
dc.languageengen_HK
dc.publisherIEEE, Computer Society. The Journal's web site is located at http://www.ieee.orgen_HK
dc.relation.ispartofProceedings - Conference on Local Computer Networks, LCNen_HK
dc.rights©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.-
dc.subjectDigital signal processing (DSP)en_HK
dc.subjectDistributed denial of service (DDoS)en_HK
dc.subjectInternet traffic analysisen_HK
dc.subjectNetwork securityen_HK
dc.subjectReduction of quality (RoQ)en_HK
dc.titleFiltering of shrew DDoS attacks in frequency domainen_HK
dc.typeConference_Paperen_HK
dc.identifier.openurlhttp://library.hku.hk:4550/resserv?sid=HKU:IR&issn=0742-1303&volume=&spage=785&epage=793&date=2005&atitle=Filtering+of+shrew+DDoS+attacks+in+frequency+domainen_HK
dc.identifier.emailKwok, YK:ykwok@eee.hku.hken_HK
dc.identifier.authorityKwok, YK=rp00128en_HK
dc.description.naturepublished_or_final_versionen_HK
dc.identifier.doi10.1109/LCN.2005.70en_HK
dc.identifier.scopuseid_2-s2.0-33751424902en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-33751424902&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.volume2005en_HK
dc.identifier.spage786en_HK
dc.identifier.epage793en_HK
dc.identifier.scopusauthoridChen, Y=7601429477en_HK
dc.identifier.scopusauthoridHwang, K=7402426691en_HK
dc.identifier.scopusauthoridKwok, YK=7101857718en_HK
dc.identifier.issnl0742-1303-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats