Detection of denial of service attacks using AGURI

Ryo Kaizaki, Kenjiro Cho, Osamu Nakamura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Denial of Service attacks is divided into two types, one is logic attack and the another one is flooding attack. Logic attack exploits security holl of the software such as operating system and web server bugs, then causes system crash or degrade in the performance. Logic attack can be defended by upgrading software and/or filtering particular packet sequences. Comparing each packets of the flooding attack and the other normal communication traffics, the only difference is the number of the packets. Flooding attack creates enormous amount of packets. Therefore, to protect systems from flooding attacks, the same method for logic attacks can not be used. During the network operations, flooding attack is usually detected by using traffic monitoring tools such as MRTG. However those tools will not detect the attack automatically. In this paper, the method for automatic detection of the flooding attacks is described. For the monitoring tools, AGURI, that we have developed, is used. Using the traffic pattern aggregation method, AGURI can monitor the traffics in a long term and detect flooding attacks.

Original languageEnglish
Title of host publicationProceeding of the International Conference on Telecommunications
EditorsL. Yuan'an, L. Yuan'an
Pages808-812
Number of pages5
Publication statusPublished - 2002 Dec 1
EventProceedings of the International Conference on Telecommunications 2002 - Beijing, China
Duration: 2002 Jun 232002 Jun 26

Publication series

NameProceeding of the International Conference on Telecommunications
Volume1

Other

OtherProceedings of the International Conference on Telecommunications 2002
Country/TerritoryChina
CityBeijing
Period02/6/2302/6/26

ASJC Scopus subject areas

  • Media Technology
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Detection of denial of service attacks using AGURI'. Together they form a unique fingerprint.

Cite this