Techniques for detecting and preventing denial of service attacks (A systematic review approach)

Hossein Zare, Mojgan Azadi, Peter Olsen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper analyzes denial of service (DoS) attacks and countermeasures based on a systematic review analysis conducted of papers between 2000 and 2016. The paper is based on three searches. The first was conducted using suitable keywords, the second using references used by selected papers, and, the third considered the most cited English-language articles. We discuss 802.11 along with one of the well-known DoS attacks at physical-level access points. Experts suggest using 802.11w, a “cryptographic client puzzle,” and “delaying the effect of request” to provide better protection in this layer. The paper discusses four main network defense systems against network-based attacks— source-end, core-end, victim-end, and distributed techniques—with a focus on two innovative methods, the D-WARD and gossip models. This study also discusses chi-squares and intrusion detection systems (IDSs), two effective models to detect DoS and DDoS attacks.

Original languageEnglish (US)
Title of host publicationInformation Technology – New Generations - 14th International Conference on Information Technology
EditorsShahram Latifi
PublisherSpringer Verlag
Pages151-157
Number of pages7
ISBN (Print)9783319549774
DOIs
StatePublished - Jan 1 2018
Externally publishedYes
Event14th International Conference on Information Technology - New Generations, ITNG 2017 - Las Vegas, United States
Duration: Apr 10 2017Apr 12 2017

Publication series

NameAdvances in Intelligent Systems and Computing
Volume558
ISSN (Print)2194-5357

Conference

Conference14th International Conference on Information Technology - New Generations, ITNG 2017
CountryUnited States
CityLas Vegas
Period4/10/174/12/17

Fingerprint

Intrusion detection
Denial-of-service attack

Keywords

  • Chi-square
  • D-WARD
  • Denial-of-service attacks
  • Gossip
  • IEEE-802.11
  • Intrusion detection systems
  • Systematic review

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science(all)

Cite this

Zare, H., Azadi, M., & Olsen, P. (2018). Techniques for detecting and preventing denial of service attacks (A systematic review approach). In S. Latifi (Ed.), Information Technology – New Generations - 14th International Conference on Information Technology (pp. 151-157). (Advances in Intelligent Systems and Computing; Vol. 558). Springer Verlag. https://doi.org/10.1007/978-3-319-54978-1_21

Techniques for detecting and preventing denial of service attacks (A systematic review approach). / Zare, Hossein; Azadi, Mojgan; Olsen, Peter.

Information Technology – New Generations - 14th International Conference on Information Technology. ed. / Shahram Latifi. Springer Verlag, 2018. p. 151-157 (Advances in Intelligent Systems and Computing; Vol. 558).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zare, H, Azadi, M & Olsen, P 2018, Techniques for detecting and preventing denial of service attacks (A systematic review approach). in S Latifi (ed.), Information Technology – New Generations - 14th International Conference on Information Technology. Advances in Intelligent Systems and Computing, vol. 558, Springer Verlag, pp. 151-157, 14th International Conference on Information Technology - New Generations, ITNG 2017, Las Vegas, United States, 4/10/17. https://doi.org/10.1007/978-3-319-54978-1_21
Zare H, Azadi M, Olsen P. Techniques for detecting and preventing denial of service attacks (A systematic review approach). In Latifi S, editor, Information Technology – New Generations - 14th International Conference on Information Technology. Springer Verlag. 2018. p. 151-157. (Advances in Intelligent Systems and Computing). https://doi.org/10.1007/978-3-319-54978-1_21
Zare, Hossein ; Azadi, Mojgan ; Olsen, Peter. / Techniques for detecting and preventing denial of service attacks (A systematic review approach). Information Technology – New Generations - 14th International Conference on Information Technology. editor / Shahram Latifi. Springer Verlag, 2018. pp. 151-157 (Advances in Intelligent Systems and Computing).
@inproceedings{a133b2b57d8044c3ad1b6fca00f2c19a,
title = "Techniques for detecting and preventing denial of service attacks (A systematic review approach)",
abstract = "This paper analyzes denial of service (DoS) attacks and countermeasures based on a systematic review analysis conducted of papers between 2000 and 2016. The paper is based on three searches. The first was conducted using suitable keywords, the second using references used by selected papers, and, the third considered the most cited English-language articles. We discuss 802.11 along with one of the well-known DoS attacks at physical-level access points. Experts suggest using 802.11w, a “cryptographic client puzzle,” and “delaying the effect of request” to provide better protection in this layer. The paper discusses four main network defense systems against network-based attacks— source-end, core-end, victim-end, and distributed techniques—with a focus on two innovative methods, the D-WARD and gossip models. This study also discusses chi-squares and intrusion detection systems (IDSs), two effective models to detect DoS and DDoS attacks.",
keywords = "Chi-square, D-WARD, Denial-of-service attacks, Gossip, IEEE-802.11, Intrusion detection systems, Systematic review",
author = "Hossein Zare and Mojgan Azadi and Peter Olsen",
year = "2018",
month = "1",
day = "1",
doi = "10.1007/978-3-319-54978-1_21",
language = "English (US)",
isbn = "9783319549774",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer Verlag",
pages = "151--157",
editor = "Shahram Latifi",
booktitle = "Information Technology – New Generations - 14th International Conference on Information Technology",

}

TY - GEN

T1 - Techniques for detecting and preventing denial of service attacks (A systematic review approach)

AU - Zare, Hossein

AU - Azadi, Mojgan

AU - Olsen, Peter

PY - 2018/1/1

Y1 - 2018/1/1

N2 - This paper analyzes denial of service (DoS) attacks and countermeasures based on a systematic review analysis conducted of papers between 2000 and 2016. The paper is based on three searches. The first was conducted using suitable keywords, the second using references used by selected papers, and, the third considered the most cited English-language articles. We discuss 802.11 along with one of the well-known DoS attacks at physical-level access points. Experts suggest using 802.11w, a “cryptographic client puzzle,” and “delaying the effect of request” to provide better protection in this layer. The paper discusses four main network defense systems against network-based attacks— source-end, core-end, victim-end, and distributed techniques—with a focus on two innovative methods, the D-WARD and gossip models. This study also discusses chi-squares and intrusion detection systems (IDSs), two effective models to detect DoS and DDoS attacks.

AB - This paper analyzes denial of service (DoS) attacks and countermeasures based on a systematic review analysis conducted of papers between 2000 and 2016. The paper is based on three searches. The first was conducted using suitable keywords, the second using references used by selected papers, and, the third considered the most cited English-language articles. We discuss 802.11 along with one of the well-known DoS attacks at physical-level access points. Experts suggest using 802.11w, a “cryptographic client puzzle,” and “delaying the effect of request” to provide better protection in this layer. The paper discusses four main network defense systems against network-based attacks— source-end, core-end, victim-end, and distributed techniques—with a focus on two innovative methods, the D-WARD and gossip models. This study also discusses chi-squares and intrusion detection systems (IDSs), two effective models to detect DoS and DDoS attacks.

KW - Chi-square

KW - D-WARD

KW - Denial-of-service attacks

KW - Gossip

KW - IEEE-802.11

KW - Intrusion detection systems

KW - Systematic review

UR - http://www.scopus.com/inward/record.url?scp=85045854531&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85045854531&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-54978-1_21

DO - 10.1007/978-3-319-54978-1_21

M3 - Conference contribution

SN - 9783319549774

T3 - Advances in Intelligent Systems and Computing

SP - 151

EP - 157

BT - Information Technology – New Generations - 14th International Conference on Information Technology

A2 - Latifi, Shahram

PB - Springer Verlag

ER -