8,748 Hits in 3.8 sec

Slow Denial-of-Service Attacks on Software Defined Networks

Túlio A. Pascoal, Iguatemi E. Fonseca, Vivek Nigam
2020 Computer Networks  
Software defined networking (SDN) Slow-rate attacks High-rate attacks a b s t r a c t Software Defined Networking (SDN) is a network paradigm that decouples the network's control plane, delegated to the  ...  This limitation has been exploited to carry out Distributed Denial of Service (DDoS) attacks, such as Saturation attacks, that generate large amounts of traffic.  ...  Conclusion This paper proposes and investigates slow attacks on Software Defined Networks, namely the Slow TCAM Exhaustion attack (Slow-TCAM) and the Slow Saturation attack.  ... 
doi:10.1016/j.comnet.2020.107223 fatcat:tp75jcxuwjekfcyurax72k3ydm

The Impact of Application-Layer Denial-of- Service Attacks [chapter]

Hugo Gonzalez, Marc Gosselin-Lavigne, Natalia Stakhanova, Ali Ghorbani
2014 Case Studies in Secure Computing  
A recent escalation of application layer Denial of Service attacks (DoS) on the Internet has quickly shifted the focus of the research community from traditional network-based denial of service.  ...  As a result, new varieties of attacks were explored: slow-rate and low-rate application layer DoS attacks.  ...  Application layer Denial of Service attacks With a focus on resource exhaustion, denial of service attacks spawn a broad spectrum of variants capable of depleting resources at any layer of traditional  ... 
doi:10.1201/b17352-14 fatcat:pljuimyn7bedhpagb3ouiimvpe

Magicwand: A platform to provide high-quality, reliable, and reproducible data sets for low-and-slow DDoS attacks

Banjo Obayomi, Christopher Todd, Lucas Cadalzo, David Killian, Anthony Wong
2021 Journal of Open Source Software  
The views, opinions, and/or findings expressed are those of the authors and should not be interpreted as representing the official views or policies of the Department of Defense of the U.S.  ...  Summary Magicwand is a Python platform to provide high-quality, reliable, and replicable data sets for low-and-slow distributed denial-of-service (LSDDoS) attacks.  ...  For attack components, Magicwand finds the configuration required to ensure an attack is strong enough to induce a denial-of-service condition on the SUT.  ... 
doi:10.21105/joss.03032 fatcat:v74ebduul5fznm5ppfi46prjda

Distributed Denial of Service Attack Categories in Software-Defined Networks

2018 Australian Journal of Basic and Applied Sciences  
Table 1 : 1 Attackers in basic categories Type Citation: Ahmed K.Al-Shammari, et al., Distributed Denial of Service Attack Categories in Software-Defined Networks, Australian Journal of Basic and  ...  Software-defined networks (SDNs), which are considered to be a network of future communications, have emerged that separate network monitoring and redirection.  ...  In the future, we aim to analyze several possible scenarios of DDoS attacks on the SDN network and analyze the results in detail in order to create a unique model for the defense of the court in order  ... 
doi:10.22587/ajbas.2018.12.11.6 fatcat:tdrscvehkrfqtmld3uxl7pdlai

IOT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN

S. E. Viswapriya, S. Dinesh, D. Viswa Ravi Teja
2021 International journal of computer science and mobile computing  
Application Layer Distributed Denial of Service (DDoS) attacks are very challenging to detect and mitigate.  ...  Various methods were used to defend these attacks based on distributed schemes with certain difficulties to count the packets or duplicates sent by a node due to lack of communication infrastructure.  ...  Richard et al, they have done Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments.  ... 
doi:10.47760/ijcsmc.2021.v10i04.003 fatcat:zt4s2w57lzhynpyqkuq6nyhb7e

Vulnerability of SDN Network Architecture and Proposed Countermeasures on Enhancing Security

2019 International journal of recent technology and engineering  
The research work focus on adding values to the Quality of Service, Latency, Load Balancing and most importantly the security aspects in various metrics of the Software Defined Networking Architecture.  ...  The odd man out architecture of Software Defined Networking by decoupling data and control plane allows the network to be configured and maintained in a real time scenario pertaining to pose a complete  ...  Distributed Denial of Service Attacks is also one of the highest alert level attacks in a Software Defined Networking Architecture.  ... 
doi:10.35940/ijrte.d5266.118419 fatcat:yi7twb3i3zahjd4mm5bknrrzpm

The Slow HTTP Distributed Denial of Service Attack Detection in Cloud

A. Dhanapal, P. Nithyanandam
2019 Scalable Computing : Practice and Experience  
Though cloud provides availability, still these applications are having potential threats of going down due to the slow HTTP Distributed Denial of Service (DDoS) attack in the cloud.  ...  The availability of online services is critical for businesses like financial services, e-commerce applications, etc.  ...  [12] , used the software-defined network method to implement their solution against the slow HTTP DDoS attacks.  ... 
doi:10.12694/scpe.v20i2.1501 fatcat:skgtxqvpavak3cb5ahre6oqaq4

Mitigation of Flooding and Slow DDoS Attacks in a Software-Defined Network [article]

Thomas Lukaseder, Shreya Ghosh, Frank Kargl
2018 arXiv   pre-print
With the improved flexibility of software-defined networks, new possibilities to mitigate such attacks can be implemented.  ...  Distributed denial of service (DDoS) attacks are a constant threat for services in the Internet. This year, the record for the largest DDoS attack ever observed was set at 1.7 Tbps.  ...  The authors alone are responsible for the content of this paper.  ... 
arXiv:1808.05357v1 fatcat:al4jq67er5ay7mq2e6yyqc6exq

HoneyMesh: Preventing Distributed Denial of Service Attacks using Virtualized Honeypots

Hrishikesh Arun Deshpande
2015 International Journal of Engineering Research and  
One such attack is called distributed denial of service attack that results in issues ranging from temporary slowdown of servers to complete non-availability of service.  ...  denial of service attacks.  ...  DISTRIBUTED DENIAL OF SERVICE ATTACKS A denial of service (DoS) attack is an attempt to make a service, usually one offered over internet, unavailable to its legitimate users [1] [2] [3] .  ... 
doi:10.17577/ijertv4is080325 fatcat:dadencyil5g6tpqf7zkktv27pi

Cyber-Security: Dos Attack Outcomes are Dangerous

M. Mattah Islam, Saifullah Shahid, Khush Bakhat Awar, Rashid Khan, Muhammad Sohail
2021 European Journal of Electrical Engineering and Computer Science  
For proving the work, different types of experiments are performed on different platforms and observed that Dos attacks are how dangerous to our systems.  ...  It is the networking tool used by developers to perform a DOS attack. SYN flooding is used for sending so many requests in an insane amount to the server and used all of the resources of the server.  ...  Denial of Service attack tries where so many attackers send large packets to one specific server.  ... 
doi:10.24018/ejece.2021.5.3.297 fatcat:la3c6jfrbjad5f37h5zkxzcvhe


This article attempts to create a software and hardware complex that can work autonomously and demonstrates the ease of implementation of attacks on denial of service on wireless networks, which in turn  ...  emphasizes the need to provide comprehensive protection of wireless networks.  ...  The model of denial-of-service attacks evolved from one attacking machine to another to several against one.  ... 
doi:10.31435/rsglobal_wos/12062018/5734 fatcat:u5pmssja5ncs7o77cbbq3ozqza

Enhancing the Impregnability of Linux Servers

Rama Koteswara Rao G, Satya Prasad R, Pathanjali Sastri A, P.E.S.N. Prasad
2014 International journal of network security and its applications  
Network security thus becomes a major concern to all IT organizations offering cloud based services. The fundamental form of attack on network security is Denial of Service.  ...  The most common form of attacks is a Denial of Service attack. This paper focuses on mechanisms to detect and immunize Linux servers from DoS .  ...  INTRODUCTION Denial of Service attack is an attack that damages a server's hardware and software resources that is initiated by a person or any other system.  ... 
doi:10.5121/ijnsa.2014.6202 fatcat:oy3af6wddrcfndekvju6a2jwxy

Battery-Powered Mobile Computer using Denial of Service

Ms.S. Kavitha, Ms.P.Aruna Devi, Ms.P. Sudha
2014 International Journal of Computer Trends and Technology  
A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.  ...  As clarification, DDoS (Distributed Denial of Service) attacks are sent by two or more persons, or bots. (See botnet) DoS (Denial of Service) attacks are sent by one person or system.  ...  [5] To combat denial of service attacks on the Internet, services like the Smurf Amplifier Registry have given network service providers the ability to ISSN: 2231-2803 Page104  ... 
doi:10.14445/22312803/ijctt-v8p119 fatcat:ecclopu4mbffpfh6mjyvsyuqdm

Attacks against Network Functions Virtualization and Software-Defined Networking: State-of-the-art

Francois Reynaud, Francois-Xavier Aguessy, Olivier Bettan, Mathieu Bouet, Vania Conan
2016 2016 IEEE NetSoft Conference and Workshops (NetSoft)  
Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) are two emerging paradigms for networks.  ...  In this paper, we survey attacks that have been or could be performed against NFV and SDN, and propose practical countermeasures when applicable.  ...  Software-Defined Networking As we have seen, Software-Defined Networks are exposed to 3 main types of attacks: Denial of Service, Man-in-the-Middle, and Network Visibility Poisoning (NVP).  ... 
doi:10.1109/netsoft.2016.7502487 dblp:conf/netsoft/ReynaudABBC16 fatcat:nhe53jicivfilcjmrtfilzbjsa

Analysis of Different Attacks on Software Defined Network and Approaches to Mitigate using Intelligent Techniques

P. Karthika, A. Karmel
2021 International Journal of Advanced Computer Science and Applications  
The detection of DDoS (Distributed Denial of Service) attacks is essential topic under network security.  ...  An overview of deep learning algorithms for sensing distributed denial of service attacks in softwaredefined networks with Deep learning is presented within this article.  ...  Distributed Denial-of-Service Attack Mitigation in Software Defined Network Mitigation of distributed denial of service (DDoS) attacks is also crucial for protecting network resources under assault.  ... 
doi:10.14569/ijacsa.2021.0120938 fatcat:r5cm4po2rnashlmu54kz2bhpgu
« Previous Showing results 1 — 15 out of 8,748 results