Skip to main content

Security Visualization: Detecting Denial of Service

  • Conference paper
  • First Online:
Industrial Networks and Intelligent Systems (INISCOM 2016)

Abstract

Denial Of Service attacks are notorious attack methods used to target servers of IT systems and Industrial Control Systems to prevent them from working or to reduce efficiency, hence decreasing user experience. Visualization is the method of taking data, processing and displaying data in an easy to view format. Visualization could be used to identify Denial Of Service attacks by monitoring the data sent to clients and being displayed to the users. Manipulating the type of data shown and the format it is shown in can help users spot potential attacks by seeing outliers in the data sets. This research develops novel software that can run on an web server. It processes the web access logs, displays the data to users and identify potential attacks in access logs. The software has been tested, with the majority of tests passing. Further development of the project is discussed and the main areas for development are also explored.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 60.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bartholemy, A., Chen, W.: An examination of distributed denial of service attacks. In: 2015 IEEE International Conference on Electro/Information Technology (EIT), pp. 274–279. IEEE (2015)

    Google Scholar 

  2. Garber, L.: Denial-of-service attacks rip the Internet. Computer 33(4), 12–17 (2000)

    Article  Google Scholar 

  3. Wan Mohd Ghazali, K., Hassan, R.: Flooding distributed denial of service attacks-a review. J. Comput. Sci. 7(8), 1218–1223 (2011)

    Article  Google Scholar 

  4. Lemon, J.: Resisting SYN flood DoS attacks with a SYN cache. In: BSDCon, vol. 2002, pp. 89–97 (2002)

    Google Scholar 

  5. Yatagai, T., Isohara, T., Sasase, I.: Detection of HTTP-GET flood attack based on analysis of page access behavior. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PacRim 2007, pp. 232–235. IEEE (2007)

    Google Scholar 

  6. Kenney, M.: Ping of death. Insecure.org (1996)

    Google Scholar 

  7. Logstalgia (2015). http://logstalgia.io/. Accessed 31 Oct 2015

  8. Nginx: Logging AND monitoring (2015). https://www.nginx.com/resources/admin-guide/logging-and-monitoring/. Accessed 31 Oct 2015

  9. Webalizer: The Webalizer (2014). http://www.webalizer.org/. Accessed 30 Oct 2015

  10. Imperva: Why Incapsula? (2015). https://www.incapsula.com/ddos/why-incapsula/. Accessed 13 Nov 2015

  11. The Apache Software Foundation: Log files (2015). https://httpd.apache.org/docs/trunk/logs.html#page-header. Accessed 30 Oct 2015

  12. Netcraft: January 2015 web server survey (2015). http://news.netcraft.com/archives/2015/01/15/ january-2015-web-server-survey.html. Accessed 20 Oct 2015

  13. SolveDNS statistics (2015). http://www.solvedns.com/statistics/. Accessed 27 Oct 2015

  14. World Wide Web Consortium: Logging control In W3C httpd (1995). http://www.w3.org/Daemon/User/Config/Logging.html#common-logfile-format. Accessed 30 Oct 2015

  15. World Wide Web Consortium: Extended log file format (2015). http://www.w3.org/TR/WD-logfile.html. Accessed 31 Oct 2015

  16. Ogbuji, U.: Working with web server logs (2009). IBM. http://www.ibm.com/developerworks/library/wa-apachelogs/. Accessed 01 Nov 2015

  17. Sauter, M.: LOIC will tear us apart the impact of tool design and media portrayals in the success of activist DDOS attacks. Am. Behav. Sci. 57(7), 983–1007 (2013)

    Article  Google Scholar 

  18. Kenkre, P.S., Pai, A., Colaco, L.: Real time intrusion detection and prevention system. In: Satapathy, S.C., Biswal, B.N., Udgata, S.K., Mandal, J.K. (eds.) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. AISC, vol. 327, pp. 405–411. Springer, Heidelberg (2015). doi:10.1007/978-3-319-11933-5_44

    Google Scholar 

  19. Qiu, B., Gooi, H.B.: Web-based SCADA display systems (WSDS) for access via Internet. IEEE Trans. Power Syst. 15(2), 681–686 (2000)

    Article  Google Scholar 

  20. Leou, R.-C., Chang, Y.-C., Teng, J.-H.: A web-based power quality monitoring system. In: Power Engineering Society Summer Meeting, vol. 3. IEEE (2001)

    Google Scholar 

  21. Maglaras, L.A., Jiang, J.: Intrusion detection in SCADA systems using machine learning techniques. In: Science and Information Conference (SAI). IEEE (2014)

    Google Scholar 

  22. Zuech, R., Khoshgoftaar, T.M., Wald, R.: Intrusion detection and big heterogeneous data: a survey. J. Big Data 2(1), 1–41 (2015)

    Article  Google Scholar 

  23. Maglaras, L.A., Jiang, J., Cruz, T.J.: Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. J. Inf. Secur. Appl., 4 May 2016. ISSN 2214-2126

    Google Scholar 

  24. Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: SCADA security in the light of cyber-warfare. Comput. Secur. 31(4), 418–436 (2012)

    Article  Google Scholar 

  25. Johnson, J.: Designing with the Mind in Mind: Simple Guide to Understanding User Interface Design Guidelines. Elsevier, Amsterdam (2013)

    Google Scholar 

  26. Syromiatnikov, A., Weyns, D.: A journey through the land of model-view-design patterns. In: 2014 IEEE/IFIP Conference on Software Architecture (WICSA), pp. 21–30, IEEE, April 2014

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ying He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Hawthorne, G., He, Y., Maglaras, L., Janicke, H. (2017). Security Visualization: Detecting Denial of Service. In: Maglaras, L., Janicke, H., Jones, K. (eds) Industrial Networks and Intelligent Systems. INISCOM 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 188. Springer, Cham. https://doi.org/10.1007/978-3-319-52569-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-52569-3_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-52568-6

  • Online ISBN: 978-3-319-52569-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics