A Proactive Design to Detect Denial of Service Attacks Using SNMP-MIB ICMP Variables

05/14/2019
by   Yousef Khaled Shaheen, et al.
0

Denial of Service (DOS) attack is one of the most attack that attract the cyber criminals which aims to reduce the network performance from doing its intended functions. Moreover, DOS Attacks can cause a huge damage on the data Confidentiality, Integrity and Availability. This paper introduced a system that detects the network traffic and varies the DOS attacks from normal traffic based on an adopted dataset. The results had shown that the adopted algorithms with the ICMP variables achieved a high accuracy percentage with approximately 99.6 in detecting ICMP Echo attack, HTTP Flood Attack, and Slowloris attack. Moreover, the designed model succeeded with a rate of 100 in varying normal traffic from various DOS attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/18/2020

Detecting Network Anomalies using Rule-based machine learning within SNMP-MIB dataset

One of the most effective threats that targeting cybercriminals to limit...
research
03/07/2018

Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs

The Man-in-the-Middle (MitM) attack is a cyber-attack in which an attack...
research
01/05/2018

A Novel Hybrid Method for Network Anomaly Detection Based on Traffic Prediction and Change Point Detection

In recent years, computer networks have become more and more advanced in...
research
06/27/2023

Catch Me If You Can: A New Low-Rate DDoS Attack Strategy Disguised by Feint

While collaborative systems provide convenience to our lives, they also ...
research
06/24/2020

Anycast Agility: Adaptive Routing to Manage DDoS

IP Anycast is used for services such as DNS and Content Delivery Network...
research
05/02/2021

Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation

In recent years, we have witnessed a new kind of DDoS attack, the burst ...
research
09/16/2019

DDoS Hide Seek: On the Effectiveness of a Booter Services Takedown

Booter services continue to provide popular DDoS-as-a-service platforms ...

Please sign up or login with your details

Forgot password? Click here to reset