Skip to main content

A LDoS Detection Method Based on Packet Arrival Time

  • Conference paper
  • First Online:
Advanced Technologies, Embedded and Multimedia for Human-centric Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 260))

Abstract

Low-rate Denial of Service (LDoS) attack is a new type of Denial of Service attack, which is difficult for the router and victim site to detect because the attack packets are as many as the valid packets. In consideration of the fact that the features in time domain between attack traffic and valid traffic are different, we present a method to identify such kind of attack and try to trace the potential location of the attacker. We also carry out a simulation to illustrate the usability of this method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yang G, Gerla M, Sanadidi MY (2004) Defense against low-rate TCP-targeted denial-of-service attacks. In: Proceedings of ninth international symposium on computers and communications ISCC 2004, vol 1. IEEE, pp 345–350

    Google Scholar 

  2. Kuzmanovic A, Knightly EW (2006) Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE/ACM Trans Networking 14(4):683–696

    Article  Google Scholar 

  3. Wong TY, Law KT, Lui JCS et al (2006) An efficient distributed algorithm to identify and traceback ddos traffic. Comput J 49(4):418–442

    Article  Google Scholar 

  4. Chang RKC (2002) Defending against flooding-based distributed denial-of-service attacks: a tutorial. Commun Mag IEEE 40(10):42–51

    Article  Google Scholar 

  5. Kuzmanovic A, Knightly EW (2003) Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. In: Proceedings of the 2003 conference on applications, technologies, architectures, and protocols for computer communications. ACM, pp 75–86

    Google Scholar 

  6. Sun H, Lui J, Yau DKY (2006) Distributed mechanism in detecting and defending against the low-rate TCP attack. Comput Netw 50(13):2312–2330

    Article  MATH  Google Scholar 

Download references

Acknowledgments

This work has been supported by the National Natural Science Foundation of China under Grant 61172072, 61271308, the Beijing Natural Science Foundation under Grant 4112045, the Research Fund for the Doctoral Program of Higher Education of China under Grant W11C100030, the Beijing Science and Technology Program under Grant Z121100000312024. The authors are also grateful for the comments and suggestions of the reviewers.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yun Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Ding, K., Liu, L., Liu, Y. (2014). A LDoS Detection Method Based on Packet Arrival Time. In: Huang, YM., Chao, HC., Deng, DJ., Park, J. (eds) Advanced Technologies, Embedded and Multimedia for Human-centric Computing. Lecture Notes in Electrical Engineering, vol 260. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-7262-5_100

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-7262-5_100

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-7261-8

  • Online ISBN: 978-94-007-7262-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics