2018
DOI: 10.1007/978-3-030-01704-0_6
|View full text |Cite
|
Sign up to set email alerts
|

SDN-Assisted Network-Based Mitigation of Slow DDoS Attacks

Abstract: Slow-running attacks against network applications are often not easy to detect, as the attackers behave according to the specification. The servers of many network applications are not prepared for such attacks, either due to missing countermeasures or because their default configurations ignores such attacks. The pressure to secure network services against such attacks is shifting more and more from the service operators to the network operators of the servers under attack. Recent technologies such as softwar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 25 publications
(22 citation statements)
references
References 10 publications
0
22
0
Order By: Relevance
“…The design goal of our system is the ease of deployment in a given software-defined network with low overhead and without changing the network topology. We base our system on our prior work introduced in 2017 [8] and extended in 2018 [9]. Two components are required to implement this…”
Section: Methodsmentioning
confidence: 99%
“…The design goal of our system is the ease of deployment in a given software-defined network with low overhead and without changing the network topology. We base our system on our prior work introduced in 2017 [8] and extended in 2018 [9]. Two components are required to implement this…”
Section: Methodsmentioning
confidence: 99%
“…During the attack, attackers may exhibit an ON-OFF attack pattern which comprises consecutive periods of inactivity (called offtime) and activity (called on-time). Once a stealthy DoS attack has seized all memory space for active connections in a Web server, the attacker tries to keep these connections open as long as possible by exploiting the characteristics of either a specific protocol (e.g., HTTP, DNS) or the application software (e.g., PHP, SOAP) [7], [8].…”
Section: A Basic Principlementioning
confidence: 99%
“…Slow action/attack is ignored in this fast-moving world and creates more vulnerability in all aspects. The more difficult part is to identify legitimate and illegitimate users [22] [23]. For this purpose, T. Lukaseder et.al.…”
Section: Figure 2: Taxonomy Of Ddos Mitigation In Sdnmentioning
confidence: 99%
“…For this purpose, T. Lukaseder et.al. in [22] proposes a framework to mitigate slow DDoS attack by continuously measuring packet rate and its distance. Researchers elaborate all attack possibilities and their possible solutions in a sophisticated manner.…”
Section: Figure 2: Taxonomy Of Ddos Mitigation In Sdnmentioning
confidence: 99%