Abstract
As the dependency on web technology increases every day, there is on the other side an increase in destructive attempts to disrupt an essential web technology, which yields an improper service. Denial of Service (DoS) attack and its large counterpart Distributed Denial of Service (DDoS) and Flash Crowd attacks are among the most dangerous internet attacks, which overwhelm the web server, thereby slow it down, and eventually take it down completely. This review paper evaluates and describes the effectiveness of different existing Frameworks and Schemes for Detecting and Preventing High Rate DoS/DDoS and Flash Crowd Attacks. Firstly, the review paper describes them according to the similar category, and then it compares them based on the predefined metrics. Finally, advantages and disadvantages for each category are described.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wei, Y., et al.: Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures. IEEE Transactions on Computers 59(12), 1655–1668 (2010)
Rahmani, H., Sahli, N., Kammoun, F.: Joint Entropy Analysis Model for DDoS Attack Detection. In: IAS 2009 Fifth International Conference on in Information Assurance and Security (2009)
Vijayasarathy, R., Raghavan, S.V., Ravindran, B.: A System Approach to Network Modeling for DDoS Detection using a Naive Bayesian Classifier. In: Third International Conference on in Communication Systems and Networks (COMSNETS) (2011)
Subbulakshmi, T., Guru, I.A.A., Shalinie, S.M.: Attack Source Identification at Router Level in Real Time using Marking Algorithm Deployed in Programmable Routers. In: International Conference on in Recent Trends in Information Technology (ICRTIT) (2011)
Oshima, S., Nakashima, T., Sueyoshi, T.: The Evaluation of an Anomaly Detection System Based on Chi-square Method. In: 26th International Conference on in Advanced Information Networking and Applications Workshops (WAINA) (2012)
Kambhampati, V., Papadopoulos, C., Massey, D.: A Taxonomy of Capabilities Based DDoS Defense Architectures. In: 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA) (2011)
Wang, Y., Tefera, S.H., Beshah, Y.K.: Understanding Botnet: From Mathematical Modelling to Integrated Detection and Mitigation Framework. In: 13th ACIS International Conference on in Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD) (2012)
Kline, E., Afanasyev, A., Reiher, P.: Shield: DoS Filtering using Traffic Deflecting. In: IEEE 19th International Conference on Network Protocols (ICNP) (2011)
Thapngam, T., Shui, Y., Wanlei, Z.: DDoS Discrimination by Linear Discriminant Analysis (LDA). In: International Conference on Computing, Networking and Communications (ICNC) (2012)
Qi, C., et al.: CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment. In: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC) (2011)
Haiqin, L., Yan, S., Min Sik, K.: Fine-Grained DDoS Detection Scheme Based on Bidirectional Count Sketch. In: Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN) (2011)
Ying, X., et al.: Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach. IEEE Transactions on Parallel and Distributed Systems 21(8), 1203–1216 (2010)
Yang, X., Ke, L., Wanlei, Z.: Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics. IEEE Transactions on Information Forensics and Security 6(2), 426–437 (2011)
Kumar, K., Sangal, A.L., Bhandari, A.: Traceback Techniques against DDOS Attacks: A Comprehensive Review. In: 2nd International Conference on Computer and Communication Technology (ICCCT) (2011)
Yi, X., Shensheng, T.: Online Anomaly Detection Based on Web Usage Mining. In: IEEE 26th Internationalin Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW) (2012)
Chengxu, Y., Kesong, Z.: Detection of Application Layer Distributed Denial of Service. In: International Conference on Computer Science and Network Technology (ICCSNT) (2011)
Jin, W., Xiaolong, Y., Keping, L.: Web DDoS Detection Schemes Based on Measuring User’s Access Behavior with Large Deviation. In: IEEE Global Telecommunications Conference (GLOBECOM 2011) (2011)
Jie, Z., et al.: An Advanced Entropy-based DDOS Detection Scheme. In: International Conference on Information Networking and Automation, ICINA (2010)
Oshima, S., Nakashima, T., Sueyoshi, T.: Early DoS/DDoS Detection Method using Short-term Statistics. In: International Conference on Complex, Intelligent and Software Intensive Systems (CISIS) (2010)
Lei, L., et al.: Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic Analysis. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2012)
Zhongmin, W., Xinsheng, W.: DDoS Attack Detection Algorithm based on the Correlation of IP Address Analysis. In: International Conference on Electrical and Control Engineering, ICECE (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Saleh, M.A., Manaf, A.A. (2014). Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review. In: Hassanien, A.E., Tolba, M.F., Taher Azar, A. (eds) Advanced Machine Learning Technologies and Applications. AMLTA 2014. Communications in Computer and Information Science, vol 488. Springer, Cham. https://doi.org/10.1007/978-3-319-13461-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-13461-1_15
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13460-4
Online ISBN: 978-3-319-13461-1
eBook Packages: Computer ScienceComputer Science (R0)