Proactive DDoS attack detection and isolation
Title | Proactive DDoS attack detection and isolation |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Kansal, V., Dave, M. |
Conference Name | 2017 International Conference on Computer, Communications and Electronics (Comptelix) |
Publisher | IEEE |
ISBN Number | 978-1-5090-4708-6 |
Keywords | Attack proxy, composability, Computer crime, computer network security, Cyber Attacks, cyber threat, Data processing, DDoS attack detection, distributed denial of service, early detection-and-isolation policy, EDIP, Human Behavior, Insider-assisted DDoS attack, insider-assisted DDoS attack mitigation, IP networks, legitimate clients, load balancing, Load management, Metrics, Migration, Monitoring, MTD, proactive DDoS attack detection, proactive DDoS attack isolation, proxy level, pubcrawl, Resiliency, resource allocation, security controls, Servers |
Abstract | The increased number of cyber attacks makes the availability of services a major security concern. One common type of cyber threat is distributed denial of service (DDoS). A DDoS attack is aimed at disrupting the legitimate users from accessing the services. It is easier for an insider having legitimate access to the system to deceive any security controls resulting in insider attack. This paper proposes an Early Detection and Isolation Policy (EDIP)to mitigate insider-assisted DDoS attacks. EDIP detects insider among all legitimate clients present in the system at proxy level and isolate it from innocent clients by migrating it to attack proxy. Further an effective algorithm for detection and isolation of insider is developed with the aim of maximizing attack isolation while minimizing disruption to benign clients. In addition, concept of load balancing is used to prevent proxies from getting overloaded. |
URL | https://ieeexplore.ieee.org/document/8003989 |
DOI | 10.1109/COMP℡IX.2017.8003989 |
Citation Key | kansal_proactive_2017 |
- legitimate clients
- Servers
- security controls
- resource allocation
- Resiliency
- pubcrawl
- proxy level
- proactive DDoS attack isolation
- proactive DDoS attack detection
- MTD
- Monitoring
- Migration
- Metrics
- Load management
- load balancing
- Attack proxy
- IP networks
- insider-assisted DDoS attack mitigation
- Insider-assisted DDoS attack
- Human behavior
- EDIP
- early detection-and-isolation policy
- distributed denial of service
- DDoS attack detection
- Data processing
- cyber threat
- Cyber Attacks
- computer network security
- Computer crime
- composability