Denial of Service Prevention through Logical Fibering

نویسنده

  • Marvin Oliver Schneider
چکیده

We propose a logic-based method to protect network nodes or web sites from Denial of Service (DoS) attacks. This method is based upon Logical Fibering. Queries to the node are stored inside the fiber and decisions whether a new query should be accepted or not are taken on an empirical basis. The respective base space consists of the incoming information whereas the fiber itself describes the universe of necessary values to treat the connection. At the end of the query processing a result of true or false for every request is reached. Apart from this specific process, a mediation scheme is initiated automatically by means of Data Mining methods. This enables to optimize the Logical Fibering structure and to assess possible similarities among attacks. The resulting information could be used by network or web managers to analyze the DoS threats to their system. This paper proposes an overview of the methodology being designed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

Portable Resource Control in Java

Preventing abusive resource consumption is indispensable for all kinds of systems that execute untrusted mobile code, such as mobile object systems, extensible web servers, and web browsers. To implement the required defense mechanisms, some support for resource control must be available: accounting and limiting the usage of physical resources like CPU and memory, and of logical resources like ...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

Computer Assisted Proof of Resistance of Denial of Service Attacks in Security Protocols Based on Events with CryptoVerif in Computational Model

Owning to the huge damage and difficulty of prevention of denial of service attacks in security protocols, people pay serious attentions on analysis, verification and prevention of denial of service attacks. Formal method in computational model is a powerful tool used to analyze and prove securities in security protocols, network and distributed system. But until now in computational model ther...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005