Characteristics of denial of service attacks on internet using AGURI

Research output: Contribution to journalArticle

7 Citations (Scopus)

Abstract

Denial of Service attacks are divided into two types, one is logic attack and the another one is flooding attack. Logic attack exploits security hole of the software such as operating system and web server bugs, then causes system crash or degrade in the performance. Logic attack can be defended by upgrading software and/or filtering particular packet sequences. In this paper, characteristics of the flooding attacks is described. For the monitoring tools, AGURI, that we have developed, is used. Using the traffic pattern aggregation method, AGURI can monitor the flooding attacks in real network traffic for a long term.

Original languageEnglish
Pages (from-to)849-857
Number of pages9
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2662
Publication statusPublished - 2003

Fingerprint

Denial of Service
Computer operating systems
Internet
Computer systems
Servers
Agglomeration
Attack
Monitoring
Software
Flooding
Logic
Web Server
Crash
Network Traffic
Denial-of-service attack
Operating Systems
Aggregation
Monitor
Filtering
Traffic

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

@article{59e3be06ffba415c89b5a06a113dd298,
title = "Characteristics of denial of service attacks on internet using AGURI",
abstract = "Denial of Service attacks are divided into two types, one is logic attack and the another one is flooding attack. Logic attack exploits security hole of the software such as operating system and web server bugs, then causes system crash or degrade in the performance. Logic attack can be defended by upgrading software and/or filtering particular packet sequences. In this paper, characteristics of the flooding attacks is described. For the monitoring tools, AGURI, that we have developed, is used. Using the traffic pattern aggregation method, AGURI can monitor the flooding attacks in real network traffic for a long term.",
author = "Ryo Kaizaki and Osamu Nakamura and Jun Murai",
year = "2003",
language = "English",
volume = "2662",
pages = "849--857",
journal = "Lecture Notes in Computer Science",
issn = "0302-9743",
publisher = "Springer Verlag",

}

TY - JOUR

T1 - Characteristics of denial of service attacks on internet using AGURI

AU - Kaizaki, Ryo

AU - Nakamura, Osamu

AU - Murai, Jun

PY - 2003

Y1 - 2003

N2 - Denial of Service attacks are divided into two types, one is logic attack and the another one is flooding attack. Logic attack exploits security hole of the software such as operating system and web server bugs, then causes system crash or degrade in the performance. Logic attack can be defended by upgrading software and/or filtering particular packet sequences. In this paper, characteristics of the flooding attacks is described. For the monitoring tools, AGURI, that we have developed, is used. Using the traffic pattern aggregation method, AGURI can monitor the flooding attacks in real network traffic for a long term.

AB - Denial of Service attacks are divided into two types, one is logic attack and the another one is flooding attack. Logic attack exploits security hole of the software such as operating system and web server bugs, then causes system crash or degrade in the performance. Logic attack can be defended by upgrading software and/or filtering particular packet sequences. In this paper, characteristics of the flooding attacks is described. For the monitoring tools, AGURI, that we have developed, is used. Using the traffic pattern aggregation method, AGURI can monitor the flooding attacks in real network traffic for a long term.

UR - http://www.scopus.com/inward/record.url?scp=35248836930&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=35248836930&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:35248836930

VL - 2662

SP - 849

EP - 857

JO - Lecture Notes in Computer Science

JF - Lecture Notes in Computer Science

SN - 0302-9743

ER -