Reference Hub3
Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacks

Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacks

Ahsan Habib
Copyright: © 2009 |Pages: 14
ISBN13: 9781599048550|ISBN10: 1599048558|EISBN13: 9781599048567
DOI: 10.4018/978-1-59904-855-0.ch015
Cite Chapter Cite Chapter

MLA

Habib, Ahsan. "Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacks." Handbook of Research on Information Security and Assurance, edited by Jatinder N. D. Gupta and Sushil Sharma, IGI Global, 2009, pp. 179-192. https://doi.org/10.4018/978-1-59904-855-0.ch015

APA

Habib, A. (2009). Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacks. In J. Gupta & S. Sharma (Eds.), Handbook of Research on Information Security and Assurance (pp. 179-192). IGI Global. https://doi.org/10.4018/978-1-59904-855-0.ch015

Chicago

Habib, Ahsan. "Edge-to-Edge Network Monitoring to Detect Service Violations and DoS Attacks." In Handbook of Research on Information Security and Assurance, edited by Jatinder N. D. Gupta and Sushil Sharma, 179-192. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-59904-855-0.ch015

Export Reference

Mendeley
Favorite

Abstract

This chapter develops a distributed monitoring scheme that uses edge-to-edge measurements to identify congested links and capture the misbehaving flows that violate service-level-agreements and inject excessive traffic that leads into denial of service (DoS) attacks. The challenge of this problem is to develop low overhead schemes that do not involve core routers in any measurement to achieve scalability. The main contribution of this work is overlay-based network monitoring schemes for efficient and scalable network monitoring. This monitoring scheme uses edge-to-edge measurements of delay, loss, and throughput to infer the internal characteristics of a network domain. The analytical and experimental results show that a network domain can be monitored with O(n) probes, where n is the number of edge routers. Upon detection of an attack, the routers regulate misbehaving flows to stop it. We introduce a new way to measure communication and computation overhead among monitoring schemes. This comparative study shows that core-assisted network monitoring has higher communication and computation overhead comparing to edge-to-edge network monitoring scheme.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.