Dual-Level Attack Detection, Characterization, and Response for Networks under DDoS Attacks

Dual-Level Attack Detection, Characterization, and Response for Networks under DDoS Attacks

Anjali Sardana, Ramesh C. Joshi
ISBN13: 9781466621633|ISBN10: 146662163X|EISBN13: 9781466621640
DOI: 10.4018/978-1-4666-2163-3.ch001
Cite Chapter Cite Chapter

MLA

Sardana, Anjali, and Ramesh C. Joshi. "Dual-Level Attack Detection, Characterization, and Response for Networks under DDoS Attacks." Contemporary Challenges and Solutions for Mobile and Multimedia Technologies, edited by Ismail Khalil and Edgar Weippl, IGI Global, 2013, pp. 1-21. https://doi.org/10.4018/978-1-4666-2163-3.ch001

APA

Sardana, A. & Joshi, R. C. (2013). Dual-Level Attack Detection, Characterization, and Response for Networks under DDoS Attacks. In I. Khalil & E. Weippl (Eds.), Contemporary Challenges and Solutions for Mobile and Multimedia Technologies (pp. 1-21). IGI Global. https://doi.org/10.4018/978-1-4666-2163-3.ch001

Chicago

Sardana, Anjali, and Ramesh C. Joshi. "Dual-Level Attack Detection, Characterization, and Response for Networks under DDoS Attacks." In Contemporary Challenges and Solutions for Mobile and Multimedia Technologies, edited by Ismail Khalil and Edgar Weippl, 1-21. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2163-3.ch001

Export Reference

Mendeley
Favorite

Abstract

DDoS attacks aim to deny legitimate users of the services. In this paper, the authors introduce dual - level attack detection (D-LAD) scheme for defending against the DDoS attacks. At higher and coarse level, the macroscopic level detectors (MaLAD) attempt to detect congestion inducing attacks which cause apparent slowdown in network functionality. At lower and fine level, the microscopic level detectors (MiLAD) detect sophisticated attacks that cause network performance to degrade gracefully and stealth attacks that remain undetected in transit domain and do not impact the victim. The response mechanism then redirects the suspicious traffic of anomalous flows to honeypot trap for further evaluation. It selectively drops the attack packets and minimizes collateral damage in addressing the DDoS problem. Results demonstrate that this scheme is very effective and provides the quite demanded solution to the DDoS problem.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.