Skip to main content

Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review

  • Conference paper
Advanced Machine Learning Technologies and Applications (AMLTA 2014)

Abstract

As the dependency on web technology increases every day, there is on the other side an increase in destructive attempts to disrupt an essential web technology, which yields an improper service. Denial of Service (DoS) attack and its large counterpart Distributed Denial of Service (DDoS) and Flash Crowd attacks are among the most dangerous internet attacks, which overwhelm the web server, thereby slow it down, and eventually take it down completely. This review paper evaluates and describes the effectiveness of different existing Frameworks and Schemes for Detecting and Preventing High Rate DoS/DDoS and Flash Crowd Attacks. Firstly, the review paper describes them according to the similar category, and then it compares them based on the predefined metrics. Finally, advantages and disadvantages for each category are described.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wei, Y., et al.: Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures. IEEE Transactions on Computers 59(12), 1655–1668 (2010)

    Article  Google Scholar 

  2. Rahmani, H., Sahli, N., Kammoun, F.: Joint Entropy Analysis Model for DDoS Attack Detection. In: IAS 2009 Fifth International Conference on in Information Assurance and Security (2009)

    Google Scholar 

  3. Vijayasarathy, R., Raghavan, S.V., Ravindran, B.: A System Approach to Network Modeling for DDoS Detection using a Naive Bayesian Classifier. In: Third International Conference on in Communication Systems and Networks (COMSNETS) (2011)

    Google Scholar 

  4. Subbulakshmi, T., Guru, I.A.A., Shalinie, S.M.: Attack Source Identification at Router Level in Real Time using Marking Algorithm Deployed in Programmable Routers. In: International Conference on in Recent Trends in Information Technology (ICRTIT) (2011)

    Google Scholar 

  5. Oshima, S., Nakashima, T., Sueyoshi, T.: The Evaluation of an Anomaly Detection System Based on Chi-square Method. In: 26th International Conference on in Advanced Information Networking and Applications Workshops (WAINA) (2012)

    Google Scholar 

  6. Kambhampati, V., Papadopoulos, C., Massey, D.: A Taxonomy of Capabilities Based DDoS Defense Architectures. In: 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA) (2011)

    Google Scholar 

  7. Wang, Y., Tefera, S.H., Beshah, Y.K.: Understanding Botnet: From Mathematical Modelling to Integrated Detection and Mitigation Framework. In: 13th ACIS International Conference on in Software Engineering, Artificial Intelligence, Networking and Parallel & Distributed Computing (SNPD) (2012)

    Google Scholar 

  8. Kline, E., Afanasyev, A., Reiher, P.: Shield: DoS Filtering using Traffic Deflecting. In: IEEE 19th International Conference on Network Protocols (ICNP) (2011)

    Google Scholar 

  9. Thapngam, T., Shui, Y., Wanlei, Z.: DDoS Discrimination by Linear Discriminant Analysis (LDA). In: International Conference on Computing, Networking and Communications (ICNC) (2012)

    Google Scholar 

  10. Qi, C., et al.: CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment. In: IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC) (2011)

    Google Scholar 

  11. Haiqin, L., Yan, S., Min Sik, K.: Fine-Grained DDoS Detection Scheme Based on Bidirectional Count Sketch. In: Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN) (2011)

    Google Scholar 

  12. Ying, X., et al.: Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach. IEEE Transactions on Parallel and Distributed Systems 21(8), 1203–1216 (2010)

    Article  Google Scholar 

  13. Yang, X., Ke, L., Wanlei, Z.: Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics. IEEE Transactions on Information Forensics and Security 6(2), 426–437 (2011)

    Article  Google Scholar 

  14. Kumar, K., Sangal, A.L., Bhandari, A.: Traceback Techniques against DDOS Attacks: A Comprehensive Review. In: 2nd International Conference on Computer and Communication Technology (ICCCT) (2011)

    Google Scholar 

  15. Yi, X., Shensheng, T.: Online Anomaly Detection Based on Web Usage Mining. In: IEEE 26th Internationalin Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW) (2012)

    Google Scholar 

  16. Chengxu, Y., Kesong, Z.: Detection of Application Layer Distributed Denial of Service. In: International Conference on Computer Science and Network Technology (ICCSNT) (2011)

    Google Scholar 

  17. Jin, W., Xiaolong, Y., Keping, L.: Web DDoS Detection Schemes Based on Measuring User’s Access Behavior with Large Deviation. In: IEEE Global Telecommunications Conference (GLOBECOM 2011) (2011)

    Google Scholar 

  18. Jie, Z., et al.: An Advanced Entropy-based DDOS Detection Scheme. In: International Conference on Information Networking and Automation, ICINA (2010)

    Google Scholar 

  19. Oshima, S., Nakashima, T., Sueyoshi, T.: Early DoS/DDoS Detection Method using Short-term Statistics. In: International Conference on Complex, Intelligent and Software Intensive Systems (CISIS) (2010)

    Google Scholar 

  20. Lei, L., et al.: Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic Analysis. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2012)

    Google Scholar 

  21. Zhongmin, W., Xinsheng, W.: DDoS Attack Detection Algorithm based on the Correlation of IP Address Analysis. In: International Conference on Electrical and Control Engineering, ICECE (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Saleh, M.A., Manaf, A.A. (2014). Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review. In: Hassanien, A.E., Tolba, M.F., Taher Azar, A. (eds) Advanced Machine Learning Technologies and Applications. AMLTA 2014. Communications in Computer and Information Science, vol 488. Springer, Cham. https://doi.org/10.1007/978-3-319-13461-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13461-1_15

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13460-4

  • Online ISBN: 978-3-319-13461-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics