Statistical signatures for early detection of flooding denial-of service attacks

5Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A major threat to the information economy is denial-of-service attacks. Despite the widespread deployment of perimeter model countermeasures these attacks are highly prevalent. Therefore a new approach is posited; early detection. This paper posits an approach that utilises statistical signatures at the router to provide early detection of flooding denial-of-service attacks. The advantages of the approach presented in this paper are threefold: analysing fewer packets reduces computational load on the defence mechanism; no state information is required about the systems under protection; and alerts may span many attack packets. Thus, the defence mechanism may be placed within the routing infrastructure to prevent malicious packets from reaching their intended victim in the first place. This paper presents an overview of the early detection-enabled router algorithm and case study results. Copyright © 2005 by International Federation for Information Processing.

Cite

CITATION STYLE

APA

Haggerty, J., Shi, Q., & Merabti, M. (2005). Statistical signatures for early detection of flooding denial-of service attacks. In IFIP Advances in Information and Communication Technology (Vol. 181, pp. 327–341). https://doi.org/10.1007/0-387-25660-1_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free