Analyzing Traffic Features of Common Standalone DoS Attack Tools

Warning

This publication doesn't include Institute of Computer Science. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

BUKAČ Vít MATYÁŠ Václav

Year of publication 2015
Type Article in Proceedings
Conference Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Proceedings
MU Faculty or unit

Faculty of Informatics

Citation
web http://www.springer.com/in/book/9783319241258
Doi http://dx.doi.org/10.1007/978-3-319-24126-5_2
Field Informatics
Keywords network security; denial of service tools; input features; traffic characteristics
Description Research on denial of service (DoS) attack detection is complicated due to scarcity of reliable, widely available and representative contemporary input data. Efficiency of newly proposed DoS detection methods is continually verified with obsolete attack samples and tools. To address this issue, we provide a comparative analysis of traffic features of DoS attacks that were generated by state-of-the-art standalone DoS attack tools. We provide a classification of different attack traffic features, including utilized evasion techniques and encountered anomalies. We also propose a new research direction for the detection of DoS attacks at the source end, based on repeated attack patterns recognition.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.

More info