Unknown

Dataset Information

0

A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems.


ABSTRACT: Large-scale network environments require effective detection and response methods against DDoS attacks. Depending on the advancement of IT infrastructure such as the server or network equipment, DDoS attack traffic arising from a few malware-infected systems capable of crippling the organization's internal network has become a significant threat. This study calculates the frequency of network-based packet attributes and analyzes the anomalies of the attributes in order to detect IP-spoofed DDoS attacks. Also, a method is proposed for the effective detection of malware infection systems triggering IP-spoofed DDoS attacks on an edge network. Detection accuracy and performance of the collected real-time traffic on a core network is analyzed thru the use of the proposed algorithm, and a prototype was developed to evaluate the performance of the algorithm. As a result, DDoS attacks on the internal network were detected in real-time and whether or not IP addresses were spoofed was confirmed. Detecting hosts infected by malware in real-time allowed the execution of intrusion responses before stoppage of the internal network caused by large-scale attack traffic.

SUBMITTER: Seo JW 

PROVIDER: S-EPMC5081987 | biostudies-literature | 2016

REPOSITORIES: biostudies-literature

altmetric image

Publications

A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems.

Seo Jung Woo JW   Lee Sang Jin SJ  

SpringerPlus 20161026 1


Large-scale network environments require effective detection and response methods against DDoS attacks. Depending on the advancement of IT infrastructure such as the server or network equipment, DDoS attack traffic arising from a few malware-infected systems capable of crippling the organization's internal network has become a significant threat. This study calculates the frequency of network-based packet attributes and analyzes the anomalies of the attributes in order to detect IP-spoofed DDoS  ...[more]

Similar Datasets

| S-EPMC8483345 | biostudies-literature
| S-EPMC10977757 | biostudies-literature
| S-EPMC10803083 | biostudies-literature
| S-EPMC10557483 | biostudies-literature
| S-EPMC10280383 | biostudies-literature
| S-EPMC9299264 | biostudies-literature
| S-EPMC9565394 | biostudies-literature
| S-EPMC3934094 | biostudies-other
| S-EPMC7179847 | biostudies-literature
| S-EPMC10798489 | biostudies-literature