• Corpus ID: 896519

Early Signals from Volumetric DDoS Attacks: An Empirical Study

@article{Nogueira2016EarlySF,
  title={Early Signals from Volumetric DDoS Attacks: An Empirical Study},
  author={Michele Nogueira and A. Santos and Jos{\'e} M. F. Moura},
  journal={arXiv: Networking and Internet Architecture},
  year={2016}
}
Distributed Denial of Service (DDoS) is a common type of Cybercrime. It can strongly damage a company reputation and increase its costs. Attackers improve continuously their strategies. They doubled the amount of unleashed communication requests in volume, size, and frequency in the last few years. This occurs against different hosts, causing resource exhaustion. Previous studies focused on detecting or mitigating ongoing DDoS attacks. Yet, addressing DDoS attacks when they are already in place… 

Figures from this paper

A Self-Adaptable System for DDoS Attack Prediction Based on the Metastability Theory

STARK identifies signs of attack before it reaches an unrecoverable stage being founded on the metastability theory, and its evaluation follows a trace-driven approach, taking as input two databases containing records of DDoS attacks.

Um Sistema Autoadaptável para Predição de Ataques DDoS Fundado na Teoria da Metaestabilidade

STARK, um sistema autoadaptativo de predicao de ataques DDoS, que identifica indicios do ataque na rede antes deste alcancar estagios avancados, proves um aprendizado estatistico nao supervisionado e Identifica a iminencia de ataque DDoS.

References

SHOWING 1-10 OF 14 REFERENCES

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

The primary intention for this work is to stimulate the research community into developing creative, effective, efficient, and comprehensive prevention, detection, and response mechanisms that address the DDoS flooding problem before, during and after an actual attack.

A novel approach to detecting DDoS Attacks at an Early Stage

Simulation results show that the cooperative technique presented in this paper can yield accurate DDoS alarms at an early stage and theoretically show the false alarm probability of the detection scheme, which is insensitive to false alarms when using specially designed evaluation functions.

Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network

An early warning system for detecting DDoS attacking has been mounted to a traditional IDS to form a completely system based on the rationale of time delay neural network.

Bohatei: Flexible and Elastic DDoS Defense

Bohatei is a flexible and elastic DDoS defense system that is scalable, responsive, and resilient to dynamic adversaries, and implemented defenses for several DDoS attacks using Bohatei.

The growth and evolution of DDoS

A Novel DoS and DDoS Attacks Detection Algorithm Using ARIMA Time Series Model and Chaotic System in Computer Networks

A set of rules are proposed based on repeatability of chaotic behavior and enormous growth in the ratio of number of packets to number of source IP addresses during attack times to classify normal and attack traffics from each other.

A survey of IT early warning systems: architectures, challenges, and solutions

A comprehensive review on early warning systems EWS including definitions, applications, architectures, alert correlation aspects, and other technical requirements is presented.

Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense

This research investigates the potential for a self-organizing anomaly detection system inspired by those observed naturally in colonies of honey bees, and provides a summary of findings from a recently presented algorithm for a nonparametric, fully distributed coordination framework.

Are mobile botnets a possible threat? The case of SlowBot Net

A Stochastic Adaptive Model to Explore Mobile Botnet Dynamics

A stochastic adaptive model for mobile botnets’ dynamics and their self-organized and self-adaptive behavior to generate DDoS attacks can explain the natural emergence of two distinct time-scales when bots massively attack a server.