An Adaptive Multi-layered Approach for DoS Detection and Mitigation

被引:1
|
作者
Ramesh, Sowmya [1 ]
Selvarayan, Subhiksha [1 ]
Sunil, Kanishq [1 ]
Arumugam, Chamundeswari [1 ]
机构
[1] Sri Sivasubramaniya Nadar Coll Engn, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2021, PT IX | 2021年 / 12957卷
关键词
Denial of Service (DoS); UDP flood attack; Intrusion Detection System; IDPS; Virtual network; INTRUSION DETECTION;
D O I
10.1007/978-3-030-87013-3_40
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A Denial of Service (DoS) attack imposes a heavy load on a system rendering it unavailable to the benign traffic. One of the most popular approaches to carry out the attack is to send a multitude of requests to the targeted site or network, causing the host or network to become unable to reply to the benign traffic or to respond slowly. The complexity and frequency of these attacks have been increasing in recent years. Hence, there is a need to design an efficient system that would detect any suspicious activity in the network and dispatch a timely and appropriate response to counter the same. In this paper, different design models and implementations of contemporary intrusion detection systems have been reviewed and analyzed for shortcomings. A multilevel design for an Intrusion Detection and Prevention System (IDPS) that aims to efficiently detect the DoS attack with minimal response time and high accuracy has been proposed. A UDP flood is simulated inside a virtual network environment to emulate the attack and the results demonstrate the successful detection and mitigation of the DoS attack.
引用
收藏
页码:533 / 545
页数:13
相关论文
共 50 条
  • [11] Blockchain-based multi-layered federated extreme learning networks in connected vehicles
    Rajan, Durga
    Eswaran, Poovammal
    Srivastava, Gautam
    Ramana, Kadiyala
    Iwendi, Celestine
    EXPERT SYSTEMS, 2023, 40 (06)
  • [12] A Cost Optimized Solution for Defending Against DDoS Attacks: An Analysis of a Multi-layered Architecture
    Gaylah K.D.
    Vaghela R.S.
    Zongo W.-B.S.
    SN Computer Science, 4 (5)
  • [13] Protocol specific Multi-threaded Network Intrusion Detection System (PM-NIDS) for DoS/DDoS Attack Detection in Cloud
    Patil, Rajendra
    Dudeja, Harsha
    Gawade, Snehal
    Modi, Chirag
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [14] An Adaptive Approach to Granular Real-Time Anomaly Detection
    Huang, Chin-Tser
    Janies, Jeff
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
  • [15] An Adaptive Approach to Granular Real-Time Anomaly Detection
    Chin-Tser Huang
    Jeff Janies
    EURASIP Journal on Advances in Signal Processing, 2009
  • [16] Adaptive Intrusion Detection: A Data Mining Approach
    Wenke Lee
    Salvatore J. Stolfo
    Kui W. Mok
    Artificial Intelligence Review, 2000, 14 : 533 - 567
  • [17] Adaptive intrusion detection: A data mining approach
    Lee, WK
    Stolfo, SJ
    Mok, KW
    ARTIFICIAL INTELLIGENCE REVIEW, 2000, 14 (06) : 533 - 567
  • [18] Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization
    Mayank Agarwal
    Dileep Pasumarthi
    Santosh Biswas
    Sukumar Nandi
    International Journal of Machine Learning and Cybernetics, 2016, 7 : 1035 - 1051
  • [19] Detection of DoS Attacks in Smart City Networks With Feature Distance Maps: A Statistical Approach
    Velliangiri, S.
    Amma, N. G. Bhuvaneswari
    Baik, Nam-Kyun
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (21) : 18853 - 18860
  • [20] CNN-LSTM Based Approach for Dos Attacks Detection in Wireless Sensor Networks
    Salmi, Salim
    Oughdir, Lahcen
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (04) : 835 - 842