Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3357613.3357638acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Modeling of low-rate DDoS-attacks

Published: 12 September 2019 Publication History

Abstract

The paper presents the results of the analysis and simulation study of Denial of Service attacks for a variety of services that store, process and transmit data to the Internet. Focuses on the simulation of low-rate Distributed Denial of Service attacks on the infrastructure of the global dynamic routing Border Gateway Protocol (BGP) and HyperText Transfer Protocol (HTTP). We choose the following software for the set-up: Apache2, Nginx, Quagga, Debian, VMware and Citrix XenServer with the most popular configuration options. The study analyzed the vulnerability of data communication protocols of the transport and application layer, leading to the possibility of the threat of low-rate DDoS-attacks. This study demonstrates the implementation of such an attack on real computer systems and computer networks.

References

[1]
[n.d.]. APACHE. HTTP server project. https://httpd.apache.org/
[2]
[n.d.]. NGINX. https://nginx.org/
[3]
[n.d.]. Slowloris HTTP DoS. https://web.archive.org/web/20090822001255/http://ha.ckers.org/slowloris/
[4]
2015. Quagga Routing Software Suite. http://www.nongnu.org/quagga/
[5]
Edward W. Knightly Aleksandar Kuzmanovic. 2006. Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE/ACM Transactions on Networking 14, 4 (2006), 683--696.
[6]
CITRIX. [n.d.]. Citrix Hypervisor. https://www.citrix.com/products/citrix-hypervisor/formerly XenServer.
[7]
Internet Systems Consortium. [n.d.]. BIND9. https://www.isc.org/bind/
[8]
Evan Damon, Julian Dale, Evaristo Laron, Jens Mache, Nathan Land, and Richard Weiss. 2012. Hands-on denial of service lab exercises using slowloris and rudy. In proceedings of the 2012 information security curriculum development conference. ACM, 21--29.
[9]
Dimitrios Moustis and Panayiotis Kotzanikolaou. 2013. Evaluating security controls against HTTP-based DDoS attacks. In IISA 2013. IEEE, 1--6.
[10]
Yakov Rekhter and Tony Li. 1995. A border gateway protocol 4 (BGP-4). (1995).
[11]
H.K. Chu V. Paxson, M. Allman and M. Sargent. 2011. Computing TCP's Retransmission Timer. RFC 6298. RFC Editor. 1--11 pages. https://tools.ietf.org/rfc/rfc6298.txt
[12]
Tarasov Y.V. 2016. Neural network method of detection of low-rate dos-attacks on web-services. In VII All-Russian Scientific and Technical Conference "Safety of information technology" (BIT - 2016). MSTU Bauman.

Cited By

View all
  • (2021)The Proposition and Evaluation of the RoEduNet-SIMARGL2021 Network Intrusion Detection DatasetSensors10.3390/s2113431921:13(4319)Online publication date: 24-Jun-2021
  • (2020)A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine LearningIEEE Access10.1109/ACCESS.2020.30193308(155859-155872)Online publication date: 2020
  1. Modeling of low-rate DDoS-attacks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '19: Proceedings of the 12th International Conference on Security of Information and Networks
    September 2019
    179 pages
    ISBN:9781450372428
    DOI:10.1145/3357613
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 September 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. HTTP protocol
    2. attack modeling
    3. border gateway protocol
    4. low-rate DDoS-attacks
    5. security of computer networks

    Qualifiers

    • Short-paper

    Funding Sources

    • Russian Foundation For Basic Research
    • Council on grants of the President of the Russian Federation.

    Conference

    SIN 2019

    Acceptance Rates

    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 28 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)The Proposition and Evaluation of the RoEduNet-SIMARGL2021 Network Intrusion Detection DatasetSensors10.3390/s2113431921:13(4319)Online publication date: 24-Jun-2021
    • (2020)A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine LearningIEEE Access10.1109/ACCESS.2020.30193308(155859-155872)Online publication date: 2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media