2015 IFIP/IEEE International Symposium on Integrated Network Management (IM) 2015
DOI: 10.1109/inm.2015.7140420
|View full text |Cite
|
Sign up to set email alerts
|

Real-time DDoS attack detection for Cisco IOS using NetFlow

Abstract: Flow-based DDoS attack detection is typically performed by analysis applications that are installed on or close to a flow collector. Although this approach allows for easy deployment, it makes detection far from real-time and susceptible to DDoS attacks for the following reasons. First, the fact that the flow export process is timeout-based and that flow collectors typically provide data to analysis applications in chunks, can result in detection delays in the order of several minutes. Second, by the nature of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Flow-based network monitoring is today the most widespread technology, and Net-Flow [11][12][13] is a widely used tool in network measurement and analysis. It is now gradually evolving into one of the most important means of ensuring network cybersecurity.…”
Section: Introductionmentioning
confidence: 99%
“…Flow-based network monitoring is today the most widespread technology, and Net-Flow [11][12][13] is a widely used tool in network measurement and analysis. It is now gradually evolving into one of the most important means of ensuring network cybersecurity.…”
Section: Introductionmentioning
confidence: 99%
“…Operators often also collect statistics about the tra c itself, usually using NetFlow/ [38,67,75]. These provide more detailed information about the ows crossing the network (e.g., layer-4 5-tuples, volumes in bytes and packet), and enable various management applications [52] (e.g., identifying major source/destination pairs [83], heavy-hitters [31], or detecting DDoS attacks [69,79]). Finally, operators monitor key performance metrics which are important for many end-to-end * O. Tilmans is supported by a grant from F.R.S.-FNRS FRIA applications, such as delays, packet losses, and retransmissions.…”
Section: Introductionmentioning
confidence: 99%
“…In a real network environment, Daniël van der Steeg and colleagues presented a prototype to detect these DDoS botnet attacks using NetFlow. 9 In addition to the aforementioned concerns, the large number of 5G subscribers' UEs with high mobility skills will require researchers //or who?// to adapt the existing detection and reaction algorithms to face botnets. 10 When bots move, the detection and reaction capabilities also have to be moved, "following" the bots, to continue performing their procedures accordingly.…”
mentioning
confidence: 99%