Proceedings of the 12th International Conference on Security of Information and Networks 2019
DOI: 10.1145/3357613.3357638
|View full text |Cite
|
Sign up to set email alerts
|

Modeling of low-rate DDoS-attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…A LR-DDoS can be broadly characterized by four parameters [19], [20], namely: T a is the attack period (frequency for sending malicious packets), T b is the burst width (time duration of the attacking pulse), R b is the attack burst rate (amount of traffic), and s is the starting time of the attack. This also implies that such an attack can be identified using the source IP and port, destination IP and port, and the protocol used in the attack.…”
Section: A Low-rate Dos Attacksmentioning
confidence: 99%
“…A LR-DDoS can be broadly characterized by four parameters [19], [20], namely: T a is the attack period (frequency for sending malicious packets), T b is the burst width (time duration of the attacking pulse), R b is the attack burst rate (amount of traffic), and s is the starting time of the attack. This also implies that such an attack can be identified using the source IP and port, destination IP and port, and the protocol used in the attack.…”
Section: A Low-rate Dos Attacksmentioning
confidence: 99%
“…There are multiple methods of attacks that can lead to denial of service. The following two types were chosen: Denial-of-Service using SlowLoris [ 34 ]: this type of DoS attack opens many HTTP connections to the target and sends incomplete, but legitimate HTTP requests or responses to the target in a very slow manner, keeping the connection alive for a long period of time. Since the HTTP messages are correct and not delivered very fast, they result in flooding the target (as most Denial-of-Service attacks work).…”
Section: Proposition Of the Roedunet2021 Datasetmentioning
confidence: 99%