Software-based computing platform as an experimental topology assembled to detect and mitigate DDoS attacks using virtual environments

A software-based computing platform has been constructed as an experimental topology with the goal to detect and mitigate DDoS using a Virtual Network Environment. This research comprises the automatic management of three main approaches, being firstly the deployment of a virtual infrastructure for experimentation, secondly the configuration of the detection and mitigation of DDoS attacks and finally the analytical tools to corroborate with introduced countermeasures. In order to accomplish these purposes, we have designed and constructed an experimental topology based on virtual networks, which injects and mitigates DDoS attacks. Simultaneously, we designed and developed a software application to manage automatically the deployment of the experimental topology and the configuration of the detection and mitigation of DDoS attacks. To guarantee the reliability of the outcome, we configured a rule-based detection mechanism for Linux through the optimization of an algorithm that resolves anomalies in firewalls rules. The results demonstrate quantitatively the efficiency of this proposal.

[1]  Timo Hämäläinen,et al.  Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol , 2015, NEW2AN.

[2]  Gail-Joon Ahn,et al.  Discovery and Resolution of Anomalies in Web Access Control Policies , 2013, IEEE Transactions on Dependable and Secure Computing.

[3]  Cristian Cappo,et al.  HTTP-WS-AD: An anomaly detector oriented to web applications and web services , 2015, 2015 Latin American Computing Conference (CLEI).

[4]  Masaharu Munetomo,et al.  Distributed denial of services attack protection system with genetic algorithms on Hadoop cluster computing framework , 2015, 2015 IEEE Congress on Evolutionary Computation (CEC).

[5]  Suchart Khummanee,et al.  Towards a new design of firewall: Anomaly elimination and fast verifying of firewall rules , 2013, The 2013 10th International Joint Conference on Computer Science and Software Engineering (JCSSE).

[6]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[7]  Lin Zhang,et al.  A Firewall Rules Optimized Model Based on Service-Grouping , 2015, 2015 12th Web Information System and Application Conference (WISA).

[8]  Steve Mansfield-Devine,et al.  The growth and evolution of DDoS , 2015, Netw. Secur..

[9]  T. Raja Sree Identifying HTTP DDoS Attacks Using Self Organizing Map and Fuzzy Logic in Internet Based Environments , 2016 .

[10]  Richard E. Overill,et al.  Detection of known and unknown DDoS attacks using Artificial Neural Networks , 2016, Neurocomputing.

[11]  Youki Kadobayashi,et al.  Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[12]  Heejo Lee,et al.  Flooding DDoS mitigation and traffic management with software defined networking , 2015, 2015 IEEE 4th International Conference on Cloud Networking (CloudNet).

[13]  Fei Gao,et al.  Audit and Processing of Anormaly Firewall Rules , 2015 .

[14]  Jorge E. López de Vergara,et al.  An emulation of VoD services using virtual network environments , 2009, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..

[15]  Kyaw Zin Lin,et al.  Enhancement of Preventing Application Layer Based on DDOS Attacks by Using Hidden Semi-Markov Model , 2015, ICGEC.

[16]  Weifeng Chen,et al.  An examination of distributed denial of service attacks , 2015, 2015 IEEE International Conference on Electro/Information Technology (EIT).

[17]  Adel Bouhoula,et al.  Formal approach for managing firewall misconfigurations , 2014, 2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS).

[18]  Bayu Adhi Tama,et al.  Data Mining Techniques in DoS/DDoS Attack Detection: A Literature Review , 2015 .

[19]  Bo Sun,et al.  A survey of defense mechanisms against application layer distributed denial of service attacks , 2015, 2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS).

[20]  Zonghua Zhang,et al.  Towards Autonomic DDoS Mitigation using Software Defined Networking , 2015 .

[21]  Jae-Kook Lee,et al.  Improved Pattern Matching Method for Intrusion Detection Systems under DDoS Attack , 2015 .

[22]  Jianhua Li,et al.  A Defense Mechanism for Distributed Denial of Service Attack in Software-Defined Networks , 2015, 2015 Ninth International Conference on Frontier of Computer Science and Technology.

[23]  Rui Wang,et al.  An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[24]  Yudhvir Singh,et al.  A Review: DoS and DDoS Attacks , 2015 .

[25]  Mazdak Zamani,et al.  A Novel WLAN Client Puzzle against DoS Attack Based on Pattern Matching , 2015 .

[26]  Ming Chen,et al.  SDSNM: A Software-Defined Security Networking Mechanism to Defend against DDoS Attacks , 2015, 2015 Ninth International Conference on Frontier of Computer Science and Technology.

[27]  Monther Aldwairi,et al.  Exhaust: Optimizing Wu-Manber pattern matching for intrusion detection using Bloom filters , 2015, 2015 2nd World Symposium on Web Applications and Networking (WSWAN).

[28]  Bhavani M. Thuraisingham,et al.  Detection and Resolution of Anomalies in Firewall Policy Rules , 2006, DBSec.

[29]  Tanmay De,et al.  DDOS Attack Detection and Mitigation Technique Based on Http Count and Verification Using CAPTCHA , 2015, 2015 International Conference on Computational Intelligence and Networks.

[30]  Kai Qian,et al.  A Neural-Network Based DDoS Detection System Using Hadoop and HBase , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[31]  Zhiyang Li,et al.  Detecting DDoS attacks against data center with correlation analysis , 2015, Comput. Commun..

[32]  Fermín Galán Márquez,et al.  A generic model for the management of virtual network environments , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.

[33]  Resul Das,et al.  Common network attack types and defense mechanisms , 2015, 2015 23nd Signal Processing and Communications Applications Conference (SIU).