Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Hop-count filtering: an effective defense against spoofed DDoS traffic
Proceedings of the 10th ACM conference on Computer and communications security
Defending Against Low-Rate TCP Attacks: Dynamic Detection and Protection
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Defense against low-rate TCP-targeted denial-of-service attacks
ISCC '04 Proceedings of the Ninth International Symposium on Computers and Communications 2004 Volume 2 (ISCC"04) - Volume 02
FLF4DoS. Dynamic DDoS Mitigation based on TTL field using fuzzy logic.
CONIELECOMP '07 Proceedings of the 17th International Conference on Electronics, Communications and Computers
Attack Simulation and Signature Extraction of Low-Rate DoS
IITSI '10 Proceedings of the 2010 Third International Symposium on Intelligent Information Technology and Security Informatics
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Hi-index | 0.00 |
As opposed to the conventional DoS attacks, Low rate DOS attacker injects a short burst of traffic periodically to fill up the bottleneck buffers right before the expiration of the sender's RTO. This forces the sender's TCP connections to timeout with very low throughput. These attacks are hard to detect and prevent, as most of the DoS attack detection systems are triggered by high- rate traffic. This paper presents the survey of techniques available for detecting Low rate DoS attacks and compares them using various parameters.