skip to main content
10.1145/1544012.1544050acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Distributed detection of large-scale attacks in the internet

Published: 09 December 2008 Publication History

Abstract

Despite the many research activities that are performed in the field of attack prevention, detection, and mitigation, large-scale attacks like Distributed Denial-of-Service (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business today. This paper outlines new mechanisms that facilitate a distributed real-time in-network attack detection. In addition, the foundations for a meaningful evaluation of large-scale detection mechanisms by means of simulations are laid.

References

[1]
Arbor Networks. Worldwide Infrastructure Security Report. http://www.arbornetworks.com/report, Sept. 2007.
[2]
C. Douligeris and A. Mitrokotsa. DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art. Computer Networks, 44(5): 643--666, Apr. 2004.
[3]
T. Gamer, C. P. Mayer, and M. Zitterbart. Distack---A Framework for Anomaly-based Large-scale Attack Detection. In Proc. of 2nd SecurWare, pages 34--40, Aug. 2008. Available at https://projekte.tm.uka.de/trac/Distack.
[4]
T. Gamer and M. Scharf. Realistic Simulation Environments for IP-based Networks. In Proc. of the 1st OMNeT++ Workshop, Mar. 2008. Available at https://projekte.tm.uka.de/trac/ReaSE.
[5]
T. Gamer, M. Schöller, and R. Bless. An extensible and flexible System for Network Anomaly Detection. In Proc. of Autonomic Networking, pages 97--108, Sept. 2006.
[6]
H. Ringberg, M. Roughan, and J. Rexford. The Need for Simulation in Evaluating Anomaly Detectors. SIGCOMM Computer Communication Review, 38(1): 55--59, Jan. 2008.
[7]
A. Varga. The OMNeT++ Discrete Event Simulation System. In Proc. of 15th ESM, pages 319--324, June 2001.

Cited By

View all
  • (2009)Towards DoS attack prevention based on clustering architecture in mobile IP communication2009 35th Annual Conference of IEEE Industrial Electronics10.1109/IECON.2009.5415302(3183-3188)Online publication date: Nov-2009

Index Terms

  1. Distributed detection of large-scale attacks in the internet

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CoNEXT '08: Proceedings of the 2008 ACM CoNEXT Conference
      December 2008
      526 pages
      ISBN:9781605582108
      DOI:10.1145/1544012
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 09 December 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article

      Acceptance Rates

      Overall Acceptance Rate 198 of 789 submissions, 25%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2009)Towards DoS attack prevention based on clustering architecture in mobile IP communication2009 35th Annual Conference of IEEE Industrial Electronics10.1109/IECON.2009.5415302(3183-3188)Online publication date: Nov-2009

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media