Application Layer DoS Attack Research Papers (original) (raw)
0 Followers
Recent papers in Application Layer DoS Attack
—Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but... more
—Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at application level can be computationally expensive and difficult to scale, while still creating bogus positives that block legitimate users. In this paper, authors show application layer DoS attack for SIP server using some open source DoS attack tools and also suggest a mechanism that can protect a given SIP server from application-level DoS attacks especially the attacks targeting the resources including CPU, sockets, memory of the victim server. In this paper author's attempt to illustrate application layer distributed denial of Service (DDoS) attack on SIP Server such as SIP flooding attack, real time transport (RTP) flooding attack using open source DDoS attack tools. We propose a new DDoS defence mechanism that protects SIP servers from application-level DDoS attacks based on the two methodologies: IPtables and fail2ban detection. The attack flow detection mechanism detects attach flows based on the symptom or stress at the server, since it is getting more difficult to identify bad flows only based on the incoming traffic patterns. A popular software known as Wireshark which is a network protocol analyzer is used to capture the packets during DoS attack from the victim server Ethernet interface to detect the attacking host IP address and analysis the types of attack. We evaluate the performance of the proposed scheme via experiment.
In the era of Big Data, Data security is of prime importance. With the increase in the amount of data, the volume of attacks also increase. The biggest threat nowadays is the Distributed Denial of service(DDOS) attacks. DDOS attacks can... more
In the era of Big Data, Data security is of prime importance. With the increase in the amount of data, the volume of attacks also increase. The biggest threat nowadays is the Distributed Denial of service(DDOS) attacks. DDOS attacks can be of two types the layer-3(network layer) attacks and layer-7 (application layer) attacks. There are numerous research works conducted on layer-3 attacks but very few research work is conducted on application layer attacks. Nowadays the application layer attacks are widespread and the current techniques presently used to counter them mainly use neural networks and machine learning. In our approach, we will be using hive queries to detect and segregate the application layer attacks.