The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l 2005
DOI: 10.1109/lcn.2005.70
|View full text |Cite
|
Sign up to set email alerts
|

Filtering of shrew DDoS attacks in frequency domain

Abstract: The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks could be even more detrimental than the widely known flooding DDoS attacks because they damage the victim servers for a long time without being noticed, thereby denying new visitors to the victim servers, which are mostly e-commerce sites. Thus, in order to minimize the huge monetary losses, there is a pressing need to effectively detect su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(41 citation statements)
references
References 18 publications
0
41
0
Order By: Relevance
“…Yu Chen et al [95][96] on the other hand have done elaborate study of Low-rate DDoS attacks or Shrew attacks. In this paper a novel approach has been proposed that filters shrew attacks by analyzing the amplitude spectrum distribution in the frequency domain.…”
Section: Spectral and Wavelets Based Detection Techniquesmentioning
confidence: 99%
“…Yu Chen et al [95][96] on the other hand have done elaborate study of Low-rate DDoS attacks or Shrew attacks. In this paper a novel approach has been proposed that filters shrew attacks by analyzing the amplitude spectrum distribution in the frequency domain.…”
Section: Spectral and Wavelets Based Detection Techniquesmentioning
confidence: 99%
“…Among the works proposed to mitigate the Shrew attacks are using Active Queue Management (AQM) (Aleksandra and Knightly, 2003), taking drop history of each flow into account (Mahajan et al, 2001), randomizing the fixed minimum RTO in TCP parameter in to make the synchronized attack more difficult, router-based detection using auto-correlation, fair resource allocation, detection at edge routers, halting anomaly with weighted choking, frequency domain spectrum analysis, wavelet-based approach, Shrew attack protection techniques based on signal analysis (Yu, Kai and Yu-Kwong, 2005), (Xiapu and Chang, 2005) and simple priority-tagging filtering mechanism (Chang et al, 2009). …”
Section: Low Rate Dos Attack Against Application Servers (Lordas)mentioning
confidence: 99%
“…The Internet research community has recognized the efficacy of using digital signal processing (DSP) techniques to detect DDoS attacks [5], [6], [7], [12], and [17]. These technologies sample the number of packet arrivals periodically and treated it as a time domain signal series.…”
Section: Related Workmentioning
confidence: 99%
“…We suggested to filter shrew attack flows by focusing on the extraordinary high energy allocated at the low frequency band [5]. Sun et al [24] also proposed to extract the signature of low-rate attack streams through analyzing the PSD of the autocorrelation sequence.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation