Analysing the Influence of the DCBF data Structure on the DoS Attack Detection

被引:0
|
作者
Dodig, Ivica [1 ]
Cafuta, Davor [1 ]
Sruk, Vlado [2 ]
机构
[1] Univ Appl Sci, Zagreb, Croatia
[2] Univ Zagreb, Fac Elect Engn & Comp, Unska 3, Zagreb, Croatia
关键词
DoS; Bloom filter; DCBF; False positive error; NETWORK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most common threats to internet security isthe Denial of Service attack. There are numerous methods and protocol changes in an effort to detect them. The most common DoS attack detection method relies on the number of the TCP control packet in the network flow. The Bloom filter represents a spaceefficient data structure that is commonly utilized to detect matching pairs. There are multiple algorithms for the DoS attack detection based on the Bloom filter. The SACK(2) algorithm uses the SYN/ACK - ACK matching pair detection with the Bloom filter data structure. The false positive error introduced by the Bloom filter influences on the matching pair detection in the algorithm. The improved SACK(2) algorithm significantly reduces the false positive error by replacing the Counting Bloom Filter (CBF) data structure with the Dual Counting Bloom Filter (DCBF) data structure. This improvement significantly improves the matching pair detection. It is expected that the false positive error should influence on the detection of the DoS attack. In this paper, the experimental study is performed to analyse this influence. This study confirms the correlation between the false positive error and the DoS attack detection.
引用
收藏
页码:791 / 797
页数:7
相关论文
共 50 条
  • [11] Authentication Flooding DOS Attack Detection and Prevention in 802.11
    Elhigazi, Abdallah
    Abd Razak, Shukor
    Hamdan, Mosab
    Mohammed, Bushra
    Abaker, Ibrahim
    Elsafi, Abubakar
    2020 18TH IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED), 2020, : 325 - 329
  • [12] DOS intrusion attack detection by Using of Improved SVR
    Hosseini, Zohreh Sadat
    Mahdavi, Seyyed Javad Seyyed
    Kamel, Seyyed Reza
    SECOND INTERNATIONAL CONGRESS ON TECHNOLOGY, COMMUNICATION AND KNOWLEDGE (ICTCK 2015), 2015, : 159 - 164
  • [13] DoS Attack Detection using Packet Statistics in SDN
    Goksel, Nail
    Demirci, Mehmet
    2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019), 2019,
  • [14] DoS Attack Detection in Internet-Connected Vehicles
    Soryal, Joseph
    Saadawi, Tarek
    2013 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2013, : 7 - 13
  • [15] Dynamic entropy based DoS attack detection method
    Zhu Jian-Qi
    Fu Feng
    Yin Ke-xin
    Liu Yan-Heng
    COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (07) : 2243 - 2251
  • [16] An Intelligence Technique for Denial of Service (DoS) Attack Detection
    Manan, Wan Nurulsafawati Wan
    Safiuddin, Tuan Muhammad
    Dzolkhifli, Zarina
    Hassin, Mohd Hafiz Mohd
    ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7446 - 7450
  • [17] Intruder Detection Mechanism Against DoS Attack on OLSR
    Sahu, Yogesh
    Rizvi, M. A.
    Kapoor, R. K.
    2016 FIFTH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS (ICECCS), 2016, : 99 - 103
  • [18] MULTOPS: A data-structure for bandwidth attack detection
    Gil, TM
    Poletto, M
    USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 23 - 34
  • [19] Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network
    C. Anand
    R. K. Gnanamurthy
    Wireless Personal Communications, 2016, 90 : 847 - 859
  • [20] Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network
    Anand, C.
    Gnanamurthy, R. K.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) : 847 - 859