11
International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Issue 6, June - 2015. ISSN 2348 – 4853 57 | © 2015, IJAFRC All Rights Reserved www.ijafrc.org Detection and Defense of DDoS Attacks Neha Titarmare * Nayan Hargule CSE Dept, RGCER, Nagpur CE Dept, SCET, Nagpur [email protected] [email protected] A B S T R A C T Distributed Denial of Service (DDoS) attacks pose severe threat to the computers and network infrastructures. There is an utmost need to develop mechanisms which can be effective against DDoS attacks which generate heavy traffic and make network bandwidth and/or system resources depleted or limited. We develop attack model which gives us an idea about the patterns of the DDoS attacks. Four types of attack namely Host scan, Port scan, TCP SYN flood, ICMP flood have been considered. The attack model depicts the patterns or behavior of the mentioned attacks. We also develop a detection mechanism, which compares the traffic flow with the attack model and identifies the particular attack. A defense mechanism based on distributed black box technique deployed in the middle of the network and swaps the source ip-address with the destination ip- address to provide effective defense. Index Terms—Attack model, DDoS, Host Scan, Port Scan, ICMP, TCP. I. INTRODUCTION DoS attacks are one of the crucial threats posed to the users and infrastructures of the Internet. A DoS attack attempts to deprive the legitimate users from using their service. It breakdowns the service and disrupt the network bandwidth. DoS attack can be launched from a single host or a network node. DDoS attacks pose a more serious threat than DoS attacks. DDoS is a type of DoS attack where an attacker deploys a number of hosts and launches an attack on the victim in a coordinated manner or simultaneously. The goal of DDoS attack is achieved by sending a large number of packets to the target and thus flooding it. The target is unable to deal with the large number of packets and gets overloaded, and ultimately becomes incapable of providing normal service. DDoS attacks can be classified on the basis of the type of resources that is consumed. 1) Resource Flooding: The attacker consumes victim’s resources such as memory, CPU, hard disk to make it unavailable for normal users. 2) Bandwidth Flooding: The victim network is flooded by unwanted traffic to prevent the normal traffic from reaching the victim network. Well known DDoS flooding attacks are TCP SYN flood attack and ICMP flood attack. TCP SYN flood makes use of TCP SYN packets while ICMP flood makes use of ICMP packets. Before attacking the target, the attacker often uses host scan and port scan to check the services that they can break into. Host scan and port scan are used as tools to check the suseptibility of the target. If host scan and port scan is carried out frequently then it can be considered as an attack. Generally, host scanning and port scanning is done to keep a watch on the systems and the network. A network administrator usually performs these scans to check network and scanning is done a fixed number of time. However, if the number of scans surpasses a fixed threshold then they are considered as attack. In

Detection and Defense of DDoS Attacks

  • Upload
    ijafrc

  • View
    212

  • Download
    0

Embed Size (px)

DESCRIPTION

Distributed Denial of Service (DDoS) attacks pose severe threat to the computers and networkinfrastructures. There is an utmost need to develop mechanisms which can be effective againstDDoS attacks which generate heavy traffic and make network bandwidth and/or systemresources depleted or limited. We develop attack model which gives us an idea about the patternsof the DDoS attacks. Four types of attack namely Host scan, Port scan, TCP SYN flood, ICMP floodhave been considered. The attack model depicts the patterns or behavior of the mentionedattacks. We also develop a detection mechanism, which compares the traffic flow with the attackmodel and identifies the particular attack. A defense mechanism based on distributed black boxtechnique deployed in the middle of the network and swaps the source ip-address with thedestination ip- address to provide effective defense.

Citation preview

Page 1: Detection and Defense of DDoS Attacks

International Journal of Advance Foundation and Research in Computer (IJAFRC)

Volume 2, Issue 6, June - 2015. ISSN 2348 – 4853

57 | © 2015, IJAFRC All Rights Reserved www.ijafrc.org

Detection and Defense of DDoS Attacks Neha Titarmare * Nayan Hargule

CSE Dept, RGCER, Nagpur CE Dept, SCET, Nagpur [email protected] [email protected]

A B S T R A C T Distributed Denial of Service (DDoS) attacks pose severe threat to the computers and network

infrastructures. There is an utmost need to develop mechanisms which can be effective against

DDoS attacks which generate heavy traffic and make network bandwidth and/or system

resources depleted or limited. We develop attack model which gives us an idea about the patterns

of the DDoS attacks. Four types of attack namely Host scan, Port scan, TCP SYN flood, ICMP flood

have been considered. The attack model depicts the patterns or behavior of the mentioned

attacks. We also develop a detection mechanism, which compares the traffic flow with the attack

model and identifies the particular attack. A defense mechanism based on distributed black box

technique deployed in the middle of the network and swaps the source ip-address with the

destination ip- address to provide effective defense.

Index Terms—Attack model, DDoS, Host Scan, Port Scan, ICMP, TCP.

I. INTRODUCTION

DoS attacks are one of the crucial threats posed to the users and infrastructures of the Internet. A DoS attack attempts to deprive the legitimate users from using their service. It breakdowns the service and disrupt the network bandwidth. DoS attack can be launched from a single host or a network node. DDoS attacks pose a more serious threat than DoS attacks. DDoS is a type of DoS attack where an attacker deploys a number of hosts and launches an attack on the victim in a coordinated manner or simultaneously. The goal of DDoS attack is achieved by sending a large number of packets to the target and thus flooding it. The target is unable to deal with the large number of packets and gets overloaded, and ultimately becomes incapable of providing normal service. DDoS attacks can be classified on the basis of the type of resources that is consumed.

1) Resource Flooding: The attacker consumes victim’s resources such as memory, CPU, hard disk to make it unavailable for normal users.

2) Bandwidth Flooding: The victim network is flooded by unwanted traffic to prevent the normal traffic from reaching the victim network.

Well known DDoS flooding attacks are TCP SYN flood attack and ICMP flood attack. TCP SYN flood makes use of TCP SYN packets while ICMP flood makes use of ICMP packets. Before attacking the target, the attacker often uses host scan and port scan to check the services that they can break into. Host scan and port scan are used as tools to check the suseptibility of the target. If host scan and port scan is carried out frequently then it can be considered as an attack. Generally, host scanning and port scanning is done to keep a watch on the systems and the network. A network administrator usually performs these scans to check network and scanning is done a fixed number of time. However, if the number of scans surpasses a fixed threshold then they are considered as attack. In

Page 2: Detection and Defense of DDoS Attacks

International Journal of Advance Foundation and Research in Computer (IJAFRC)

Volume 2, Issue 6, June - 2015. ISSN 2348 – 4853

58 | © 2015, IJAFRC All Rights Reserved www.ijafrc.org

host scan attack, the attacker scans or analyses the other host computer, so as to gain their information such as services available, and check their vulnerability. Port scan attack is performed to check the active ports and services provided by them. The objective of this is to find the vulnerable ports of a target host [2] [4][12]. In most of the previous work [5] [11] an attack model is described as a model where an attack is generated. In this paper, we propose an attack model to extract the attack patterns for the attack. These attack patterns help us to identify the type of attack, nature and its characteristics. The purpose of attack model is to effectively differentiate between attack flow and normal flow. Differentiating the attack flow facilitates effective detection of specific attacks. Our technique is based on the concept of lightweight detection [2] [3] [4]. We have based our attack model on four types of DDoS attacks: Host scan, Port scan, TCP SYN flood, ICMP flood. Preliminary results show that the method is effective to extract the attack patterns and detect them. Also we defend the attacks using Distributed Black Box strategy. Following this introduction, the paper is organized as follows. Section 2 describes the previous work in the area of DDoS attack. Section 3 describes in detail, our proposed attack model methodology and detection and defense method. Section 4 describes our experiments and results. Section 5 discusses limitation of the work, conclusion.

II. RELATED WORK

A. Intrusion Detection System (IDS)

Intrusion detection system (IDS) has been extensively used to protect against the DDoS attacks. IDS detect attacks either by using signatures or anomaly behaviour. In signature based IDS, signatures of attack are matched to the traffic flow to identify the attack. In anomaly based IDS, deviation from normal system behaviour helps to detect an attack. The weakness of signature IDS is that it cannot detect new attack while anomaly IDS considers normal activity as malicious. Intrusion detection systems cause high level of resource consumption.

B. BLINC[1]

BLINC or BLINd Classification is an approach based on classification of traffic flows according to the applications that generate them. The method observes and identifies the patterns of host behaviour. The patterns are analysed at three different levels namely a) the social level b) the functional level c) the application level. Analysing the traffic flows at different levels is the distinct feature of this approach. The method is operated in dark means it does not access the packet payload, there is no knowledge of port numbers and only information about the current flow collectors is provided. There are two unique features of the method, first is that it focuses on classifying the individual flows to associating Internet hosts with applications and after that it classifies the flow accordingly. The authors believe that, by observing the host activity more information can be extracted and nature of applications of the host can be deduced. Second, BLINC analyses host behaviour at three different levels:

a) social level b) functional level c) application level

At the social level, host popularity is taken into consideration. The interactions of a host with other host are observed. Also, it identifies the host communities. At the functional level, the functional role of host in

Page 3: Detection and Defense of DDoS Attacks

International Journal of Advance Foundation and Research in Computer (IJAFRC)

Volume 2, Issue 6, June - 2015. ISSN 2348 – 4853

59 | © 2015, IJAFRC All Rights Reserved www.ijafrc.org

the network is considered, such as if the host is provider or consumer of a service or both. The role of a host is identified by observing the number of ports a single host uses for communication. For example: If a single port has been used by a host in number of interactions then BLINC assumes that the host provides a specific service. At the application level, transport layer interactions between hosts on specific ports are captured to identify the application of origin. For each application, the behaviour pattern is created in the form of graphlets. In BLINC classification, a set of predefined graphlets is matched with flow behaviours. The key feature of this methodology is tunability. The method gives results at different levels of detail with accuracy. BLINC first analyses traffic at three mentioned levels. Then a criterion for classification is controlled using thresholds which can be relaxed or tightened. There is a flexibility to choose level of accuracy and detail according to i) the goal of the study ii) the amount of exogenous information. The other highlights of the work are development of classification benchmark, identification of patterns of behaviour, highly accurate classification and detection of unknown attacks. The distinctness of BLINC is that it focuses on all flows generated by hosts. BLINC is advantageous in the sense that it identifies unknown applications such as malicious flows.

C. Lightweight Detection [2]

The lightweight detection technique is based on the Blind classification or BLINC [1]. In this work, DoS attacks are classified into four classes namely, SYN flood, ICMP flood, port scan and host scan. Here the attack pattern is described as graphlet. SYN flood, ICMP flood, and host scan graphlets are defined in this paper while the port scan graphlet is taken from BLINC [1]. Lightweight technique detects attack by comparing the traffic flow with the graphlets. In TCP SYN flood attack, the attacker sends a large number of TCP SYN packets with a spoofed source IP address. Since the target gets flooded with the half open connection its resources are consumed and it does not provide a normal service. In ICMP flood attack, the attacker sends a large number of ICMP packets.

Fig 1. Flowchart for DoS detection [2]

This attack is detected by the large number of ICMP packets destined to the same IP address. Port scan and host scan are used as tools by the attacker to check the vulnerability of the systems. Host scan and port scan finds out the vulnerable target host and its port. Lightweight detection method is advantageous because of its light weight. Without analysing the packet content, packet size, or packet inter- arrival time, it can identify the DoS activities.

Fig 2. DoS attack graphlet [2]

Page 4: Detection and Defense of DDoS Attacks

International Journal of Advance Foundation and Research in Computer (IJAFRC)

Volume 2, Issue 6, June - 2015. ISSN 2348 – 4853

60 | © 2015, IJAFRC All Rights Reserved www.ijafrc.org

D. LD2[3]

The LD2 method proposes lightweight detection of DoS attacks. The system observes the flow behaviours and matches them with graphlets for each attack. The system is said to be lightweight as it does not analyses the packet such as its contents, size or statistics. Six types of DoS attacks is employed in this method such as SYN flood, ICMP flood, host scan, port scan, UDP flood and smurf. In LD2 the effect of background traffic intensity is studied. Based on this study, appropriate threshold levels are defined. The performance of LD2 work is benchmarked in terms of detection accuracy, CPU utilization and memory requirement. This method is based on the idea of BLINC. The system analyses and differentiates flow behaviours into graphlets of different attack types. A graphlet is defined as a signature which captivates the behaviour of a specific attack. Every graphlet depicts the relationship between source and destination ports usage, the sets of distinct ports and IPs. The LD2 system observes attack activities for time interval of one minute. During each interval packets are captivated and differentiated into flows of five tuples namely srcIP, protocol, dstIP, srcPort, dstPort. All flow records are mapped to the graphlets at the end of the interval. If the graphlets matches, all flows of that graphlet are considered as attack activity. After this, the graphlet is removed from the system and the unmatched graphlets are carried forward for next analysis. For each type of attack there can be multiple graphlets since the graphlets are indexed by source IP addresses. The intensity of background traffic plays a major role in deciding the threshold of graphlet matching. The LD2 is trained to recognize attack traffic at various intensity levels of background traffic to determine the threshold levels. Two types of background traffic traces namely controlled traces and real traffic traces are used. The key advantage of LD2 is that it detects rate based attack such as flooding attacks. Its flexibility recognizes abnormal traffic such as Trojans and worms. It consumes less memory. However, the disadvantage is that it cannot detect bad traffic except DoS and requires more CPU resources [13]. E. Defense against DDoS using distributed Black Box and Graveyard strategies

This paper introduces two strategies of defense mechanisms: Distributed Black Box/Packet Reflector and the Graveyard. The first scheme that is Distributed Black Box is distributed in nature and employs hybrid defense mechanisms. The hybrid mechanism uses three basic ideas: multi deployment in the middle locations, data mining and knowledge sharing, and mixing of previously suggested defense mechanisms. Thereby, it is called as Distributed Black Box and can be placed anywhere in the network. Three main places have been suggested where the mechanism can be deployed, they are:

1) Near the targeted system, 2) Near the Attacker, 3) In the middle.

The packet reflector performs the function of a) Rate Limiting – to slow down the rate of incoming packets, in the event of attack. b) Works as reflecting surface: copies the source address of incoming packet forwards to new destination. In reflection process, destination address is replaced by source address. c) Deploys the defense mechanism at various location . The demerit of this mechanism is that the middle area between the attacker and victim is under the control of various internet providers. These providers do not pay heed for effective defense mechanisms. The black box requires additional time to alter the header and resend it. The Rate Limit does not give enough time to achieve defense mechanism definitely. The packets are categorized into three types: a) Normal b) Suspicious c) Malicious. The Graveyard Defense Technique is divided into two stages: a) Detection Analysis stage b) Traffic Control Stage. In the detection analysis stage, primary testing is done to verify if the incoming packet is DDoS malicious. If it is not then it is free to go anywhere. If the packet is malicious it is sent to the second stage,

Page 5: Detection and Defense of DDoS Attacks

International Journal of Advance Foundation and Research in Computer (IJAFRC)

Volume 2, Issue 6, June - 2015. ISSN 2348 – 4853

61 | © 2015, IJAFRC All Rights Reserved www.ijafrc.org

where next level of testing is performed. In the traffic control stage each packet is assigned a category. Suspected packets are continuously monitored and their speed is controlled while malicious packets are immediately dropped in the graveyard. In graveyard, packets are given a chance to live if a mistake was committed in sending them to graveyard. A second test is done to be sure whether the packet is still needed. In this model manipulation and reflection has been removed to make the process manageable. It still requires accurate testing operations to be reliable.

III. METHODOLOGY

In this section we describe our technique. Our proposed method for attack model is based on lightweight methodology [2] [3]. The attack model[5] [11] contains signatures or attack patterns of the four attacks namely host scan, port scan, TCP SYN flood, ICMP flood. The model helps to effectively differentiate between the attack flow and normal traffic. The attack patterns are extracted from traffic flow. In our work, we develop four attack models for each type of attack. The idea is to first generate an attack [6] [7] to observe it and then extract the patterns or features of the attack. Thus, for every attack a different model exists.

Fig 3. Attack Model Generation

For TCP SYN flood attack model, we first generate the TCP SYN flood attack, when the attack is generated we observe it and extract the pattern of the attack. In TCP SYN attack [6], the attacker sends SYN packet to the target with erroneous IP address. A SYN packet is used as a request to open a TCP connection. For every such request, the target will send SYN/ACK packet as a reply and tries to establish a TCP connection. These connections are never completed and they remain “half open” on account of spurious IP address of the attacker. The victim indefinitely waits for the reply of the attacker. As a result its resources are depleted while legitimate connections are denied. Thus, we can say that SYN flood attack has occurred if different numbers of source ports or source IPs are seen in the attack model. The attack is implemented by making modifications in the TCP SYN packet header unlike [2] [3]. We increment the sequence number of the packets, so that wrong sequence numbered packets are delivered to the victim and it waits indefinitely to complete the connection. In ICMP flood attack [6], the attacker sends a large number of ICMP packets to the victim. Thereby, the target gets flooded with packets depleting the data transmission capacity for legitimate traffic. Thereby, in ICMP attack model, there is a continuous flow of packets. This attack is implemented by making changes in the ICMP packet header unlike [2] [3]. A counter is setup in the packet header which increments and floods the victim with a large number of packets.

Page 6: Detection and Defense of DDoS Attacks

International Journal of Advance Foundation and Research in Computer (IJAFRC)

Volume 2, Issue 6, June - 2015. ISSN 2348 – 4853

62 | © 2015, IJAFRC All Rights Reserved www.ijafrc.org

In host scan attack model, we fix a threshold value. If the number of times of the scan surpasses the threshold value, then host scan attack is generated. However, if the numbers of scans are within the threshold limit it will not be considered as an attack but a normal host scan activity. Host scan attack is generated by sending ICMP packets. Attacker sends a packet to a host, if a reply comes then it symbolizes that the host is active. Then data packets are sent to establish connection with the victim and to extract the required information of the host. In port scan attack model, ports are scanned using a threshold value. If the ports are scanned beyond the threshold value it is indicated as an attack. However, if it is scanned below threshold value it is considered as normal activity. Port scanning informs which ports are active and services provided by them [12]. The active ports are scanned a number of times to extract more information such as port number, destination IP address and services provided [8].

Basically, host scan and port scan do not impose any threat to the systems. They are carried out to check the vulnerability. After that, the attacks are launched by the attacker. The common tuple which is used in all the four models is sourceIP address. Other tuples vary according to the nature of the attacks. Thus, we have developed four attack models which distinguish between the normal traffic flow and attack traffic flow.

Fig 4. Attack Model for TCP SYN Flood Fig 5. Attack Model for ICMP

Fig 6. Attack Model for Port Scan Fig 7. Attack Model for Host Scan

Detection of DDoS Using Attack Model

Each type of attack is detected by comparing flow behaviours against the attack models.

Page 7: Detection and Defense of DDoS Attacks

International Journal of Advance Foundation and Research in Computer (IJAFRC)

Volume 2, Issue 6, June - 2015. ISSN 2348 – 4853

63 | © 2015, IJAFRC All Rights Reserved www.ijafrc.org

Fig 8. Flowchart for DDoS Detection

Our detection method has three steps: The traffic flow module captures the traffic flow based on 5-tuple flow records (srcIP, protocol, dstIP, srcPort, and dstPort) and sends flow records to the Match with Attack Model module, which maps each flow record to pre-defined attack model. Finally, the Identify DDoS attack module uses predefined threshold value to identify flows associated with DDoS activities. Flows that match with one of the model are then classified as DDoS traffic. The model that has been classified in each interval will be removed from memory. The flows classified as DDoS attack will be kept for future reference. Any unclassified pattern will be considered as unknown. The key advantage of the proposed method is its lightweight. It can identify a group of hosts associated with DDoS activities without analyzing packet content, packet size. Furthermore, our technique can detect other network anomaly if they pose similar behaviours as these DDoS attacks. Defense of DDoS Attack using distributed Black Box and Graveyard strategies One of the main points in designing an effective defence mechanism is where to place that solution to perform better. There are three main suggestions of places where these mechanisms could be placed and they are: • Near the targeted system: It is not possible to place the defence mechanism near the target as it hard to predict the target. • Near the Attacker: An effective implementation of defence mechanism is to place the defence mechanisms near all possible attackers over the network, and this is, of course, infeasible. • In the middle: In this model, we use the defence mechanisms to provide protection to every connected node. The configuration of the Distributed black box has to perform the following tasks: 1. Works as a reflecting surface (e.g. a mirror); it copies the source address of the incoming packet (even if the address was spoofed) and forwards it to the new destination. 2. Deploys the defence mechanism at different locations i.e. in the middle of the network. This deployment will guarantee a reasonable minimization of the huge number of attacking packets coming to the victim's network. Each node in the Distributed black box mechanism will take some of the incoming packets and reflects them back to the source address using header manipulation tools. In this reflection, the destination address will be replaced by the source address that is copied from the incoming malicious packets. Each additional node that contains the black box will add more security to defence the network. In fact, we do not expect from a single box to successfully resist an attack but

Traffic Flow

Match with Attack Models

Flow associated with attack

Identify DDoS

Attacks

Flow of Attack

Page 8: Detection and Defense of DDoS Attacks

International Journal of Advance Foundation and Research in Computer (IJAFRC)

Volume 2, Issue 6, June - 2015. ISSN 2348 – 4853

64 | © 2015, IJAFRC All Rights Reserved www.ijafrc.org

multiple black boxes will guarantee relatively low damages. In this proposal, mixing more than one idea into one mechanism enhances the strengths of defense against DDoS attack.

IV. EXPERIMENTAL RESULTS

In this section we describe our results using network simulator.

Fig 9. Host Scan Detection Fig 10. Port Scan Detection

Fig 11. ICMP Flood Detection Fig 12. TCP SYN Flood Detection

The Fig 9 depicts the host scan detection. Fig 10 depicts the port scan detection. Fig 11 depicts the ICMP detection. Fig 12 depicts TCP SYN Flood attack.

Fig:13 Host Scan Attack Defense Fig:14 Reflection of Packets back to Source in Host Scan

Page 9: Detection and Defense of DDoS Attacks

International Journal of Advance Foundation and Research in Computer (IJAFRC)

Volume 2, Issue 6, June - 2015. ISSN 2348 – 4853

65 | © 2015, IJAFRC All Rights Reserved www.ijafrc.org

Fig:15 Port Scan Attack Defense Fig:16 Reflection of Packets back to Source in Port

Scan

Fig: 17 ICMP Flood Attack Defence Fig:18 Reflection of Packets back to Source in ICMP Flood

Fig: 19 TCP SYN Flood Attack Defence

V. CONCLUSION

Page 10: Detection and Defense of DDoS Attacks

International Journal of Advance Foundation and Research in Computer (IJAFRC)

Volume 2, Issue 6, June - 2015. ISSN 2348 – 4853

66 | © 2015, IJAFRC All Rights Reserved www.ijafrc.org

We propose attack models for the four DDoS attack. The model extracts the attack patterns for the host scan attack, port scan attack, TCP SYN flood attack, ICMP flood attack. The model is generated in two steps, first we generate the attacks and secondly we extract the attack patterns on the basis of their flow behaviour. The advantage of the method is that we can effectively differentiate between a normal flow and attack flow. For generation of attack models we need to have prior knowledge about the nature and characteristics of the attacks. The model identifies attack flow but it cannot identify the specific attack except those mentioned above. Throughput, response time and detection rate are parameters of detection. Throughput is 87.31 % and detection rate is 97%. We have also successfully defended the various attacks using distributed black box and graveyard method. The parameters for defense are false positive, effectiveness and false negative.

VI. REFERENCES

[1] Thomas Karagiannis, Konstantina Papagiannaki, and Michalis Faloutsos, “BLINC: Multilevel

Traffic Classification in the Dark,” ACM Sigcomm, 2005. [2] Sirikaran Pukkawanna, Vasaka Visoottiviseth, Panita Pongpaibool” Lightweight Detection of DoS

Attacks ”In Proc of IEEE ICON 2007, Adelaide, South Australia, November 2007. [3] Sirikaran Pukkawanna, Panita Pongpaibool, Vasaka Visoottiviseth, “LD2: A System for

Lightweight Detection of Denial of Service Attacks”IEEE 2008. [4] Neha Titarmare, Nayan Hargule, Priyanka Gonnade, Punam Marbate, “DDoS Detection using

Attack Model”, IJARCSSE,Vol 4, Issue 6, June 2014.. [5] Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen “A Detection and Offense Mechanism to Defend

Against Application Layer DDoS Attacks” Third International Conference on Networking and Services (ICNS’07).

[6] Jelena Mirkovi´c, Gregory Prier, Peter Reiher,” Attacking DDoS at Source”. [7] J. Mirkovic, J. Martin, and P. Reiher, “A Taxonomy of DDoS Attacks and DDoS Defense

Mechanisms,” ACM Sigcomm Computer Comm. Rev., vol. 34, no.2, 2004, 39–53. [8] Cynthia Bailey Lee, Chris Roedel, Elena Silenok, “Detection and Characterization of Port Scan

Attacks”. [9] Theerasak Thapngam, Shui Yu, Wanlei Zhou, Gleb Beliakov,”Discriminating DDoS Attack Traffic

from Flash Crowd through Packet Arrival Patterns” First International Workshop on Security in Computers, Networking and Communications, IEEE 2011.

[10] Simona Ramanauskaitė1, Antanas Čenys, “Composite DoS Attack Model ”, ISSN 2029-2341 print /

ISSN 2029-2252, Vilniaus Gedimino technikos universitetas. [11] Jalal Atoum, Omar Faisal, “Distributed Black Box and Graveyards Defense Strategies against

Distributed Denial of Services”, Second International Conference on Computer Engineering and Applications (ICCEA), 2010.

Page 11: Detection and Defense of DDoS Attacks

International Journal of Advance Foundation and Research in Computer (IJAFRC)

Volume 2, Issue 6, June - 2015. ISSN 2348 – 4853

67 | © 2015, IJAFRC All Rights Reserved www.ijafrc.org

[12] Cynthia Bailey Lee” Detection and Characterisation of Port Scan Attacks”. [13] Snort, http://www.snort.org. [14] Jalal Atoum, Omar Faisal “Distributed Black Box and Graveyard Defense Strategies Against

Distributed Denial of Services”, Second International Conference on Computer Engineering and Applications (ICCEA’10).