Analyzing Traffic Features of Common Standalone DoS Attack Tools
Authors | |
---|---|
Year of publication | 2015 |
Type | Article in Proceedings |
Conference | Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Proceedings |
MU Faculty or unit | |
Citation | |
Web | http://www.springer.com/in/book/9783319241258 |
Doi | http://dx.doi.org/10.1007/978-3-319-24126-5_2 |
Field | Informatics |
Keywords | network security; denial of service tools; input features; traffic characteristics |
Description | Research on denial of service (DoS) attack detection is complicated due to scarcity of reliable, widely available and representative contemporary input data. Efficiency of newly proposed DoS detection methods is continually verified with obsolete attack samples and tools. To address this issue, we provide a comparative analysis of traffic features of DoS attacks that were generated by state-of-the-art standalone DoS attack tools. We provide a classification of different attack traffic features, including utilized evasion techniques and encountered anomalies. We also propose a new research direction for the detection of DoS attacks at the source end, based on repeated attack patterns recognition. |
Related projects: |