S. Shiaeles: Real Time Detection and Response of Distributed Denial of Service Attacks for Web Services

S. Shiaeles: Real Time Detection and Response of Distributed Denial of Service Attacks for Web Services

Contents Real time detection and response of distributed denial of service attacks for web services A thesis submitted for the degree of Doctor of Philosophy by Stavros Shiaeles Democritus University of Thrace Department of Electrical and Computer Engineering Xanthi, October 2013 i Contents Copyright ©2013 Stavros Shiaeles Democritus University of Thrace Department of Electrical and Computer Engineering Building A, ECE, University Campus – Kimmeria, 67100 Xanthi, Greece All rights reserved. No parts of this book may be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the author. ii Contents I would like to dedicate this thesis to my parents. iii Contents iv Contents Contents Advising Committee of this Doctoral Thesis .................................... ix Approved by the Examining Committee .......................................... xi Acknowledgements ........................................................................ xiii Abstract ......................................................................................... xv Extended Abstract in Greek (Περίληψη) ......................................... xvii List of Figures ................................................................................ xxiii List of Tables .................................................................................. xxv Abbreviations ................................................................................. xxvii Chapter 1: Introduction .................................................................. 1 1.1 Introduction and motivation .......................................................... 3 1.2 Scope, goals and objectives .......................................................... 4 1.3 Research methodology ................................................................. 5 1.3.1 Literature review ..................................................................... 5 1.3.2 Analysis and investigation ........................................................ 5 1.3.3 Testbeds ................................................................................ 5 1.4 Novel aspects of thesis ................................................................. 6 1.5 Dissertation Outline ..................................................................... 7 Chapter2: Background .................................................................... 11 2.1 Fuzzy Logic ................................................................................. 13 2.1.1 Introduction to Fuzzy Logic ...................................................... 13 2.1.2 Basic Principles of Fuzzy Logic .................................................. 13 2.1.3 Basic Terms .......................................................................... 14 2.1.4 Basic Properties of Fuzzy Sets .................................................. 15 2.1.5 Membership Functions ............................................................ 16 2.1.6 Fuzzy Set Operations .............................................................. 19 2.1.7 Linguistic Modifiers or Linguistic Hedges .................................... 20 2.1.8 If-then Rules ......................................................................... 21 2.1.9 Fuzzy Logic Controllers ........................................................... 22 2.1.10 Fuzzy Logic Systems ............................................................. 24 2.1.11 Mamdani Fuzzy Model ........................................................... 24 2.1.12 Sugeno Systems type ........................................................... 27 2.2 Fuzzy Estimators ......................................................................... 28 2.2.1 Preliminaries ......................................................................... 29 2.2.2 Non-Asymptotic Fuzzy Estimators ............................................. 30 2.3 Bots, Botnets and C&C Servers ...................................................... 32 2.3.1 Introduction .......................................................................... 32 2.3.2 Anatomy of a DDoS attack ....................................................... 33 2.3.3 Preparing the bot for the Client ................................................ 35 2.3.4 Setting Up the Command and Control Server ............................. 36 2.3.5 Performing the attacks ............................................................ 37 2.3.5.1 ICMP attack ..................................................................... 38 2.3.5.2 UDP flood attack ............................................................... 38 2.3.5.3 SYN flood attack ............................................................... 38 2.3.5.4 HTTP flood attack ............................................................. 39 2.4 BoNeSi DDoS emulator ................................................................. 39 v Contents 2.4.1 Introduction .......................................................................... 39 2.4.2 Installation ........................................................................... 40 2.4.3 Attacking .............................................................................. 40 Chapter 3: Real Time DDoS Detection using Fuzzy Estimators ........ 45 3.1 Introduction ................................................................................ 47 3.2 Related Work .............................................................................. 47 3.3 Description of the proposed method ............................................... 49 3.3.1 Non-Asymptotic Fuzzy Estimators: Our approach ........................ 49 3.4 Empirical evaluation ..................................................................... 51 3.4.1 Datasets ............................................................................... 52 3.4.2 Empirical results .................................................................... 53 3.4.3 Performance, accuracy and limitations ...................................... 54 3.5 Conclusion .................................................................................. 58 Chapter 4: An improved IP spoofing detection method for web DDoS attacks ..................................................................... 59 4.1 Introduction ................................................................................ 61 4.2 Related Work .............................................................................. 61 4.3 Fuzzy Hybrid Spoof Detector Conceptual Model ................................ 63 4.4 A prototype implementation of FHSD and Experimental design ........... 70 4.5 Results ....................................................................................... 73 4.6 Discussion .................................................................................. 75 4.7 Limitations ................................................................................. 77 4.8 Conclusion .................................................................................. 78 Chapter 5: On scene criminal investigation of a “zombie” computer ........................................................................ 79 5.1 Introduction ................................................................................ 81 5.2 Related Work .............................................................................. 81 5.3 Methodology ............................................................................... 83 5.4 Testbed setup procedure .............................................................. 83 5.5 Testing Triage Tools ..................................................................... 85 5.5.1 TriageIR v.0.79 ..................................................................... 85 5.5.2 TR3Secure ............................................................................ 86 5.5.3 Kludge 3.20110223 ................................................................ 88 5.6 Results ....................................................................................... 89 5.6.1 TriageIR v.0.79 ..................................................................... 96 5.6.2 TR3Secure ............................................................................ 96 5.6.3 Kludge 3.20110223 ................................................................ 97 5.7 Drawbacks .................................................................................. 97 5.7.1 TriageIR v.0.79 ..................................................................... 97 5.7.2 TR3Secure ............................................................................ 99 5.7.3 Kludge 3.20110223 ................................................................ 99 5.8 Adherence to ACPO Principle 2....................................................... 100 5.8.1 TriageIR v.0.79 ..................................................................... 100 5.8.2 TR3Secure ............................................................................ 101 5.8.3 Kludge 3.20110223 ................................................................ 101 5.9 Conclusion .................................................................................. 102 5.9.1 TriageIR v.0.79 ..................................................................... 102 5.9.2 TR3Secure ............................................................................ 103 5.9.3 Kludge 3.20110223 ................................................................ 103 vi Contents Chapter 6: Conclusions

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    204 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us