{"title":"Construction of distributed LDoS attack based on one-dimensional random walk algorithm","authors":"Xiaoming Liu, Miao Zhang, Guoai Xu","doi":"10.1109/CCIS.2012.6664262","DOIUrl":null,"url":null,"abstract":"This paper designs a distributed low-rate DoS (LDoS) attack using random walk algorithm; random walk algorithm can be used in generating power-law distribution which complies with normal network behavior feature. In this attack pattern, the behavior of each distributed attack flows are normal and nonperiodic, while the superposed effect has the same damage degree as traditional square wave LDoS attacks. As the distributed attack flow satisfies the network traffic behavior feature, it is more difficult to detect and trace attack sources. The study on the feature of this attack provides reference for distributed low-rate DoS attack countermeasures.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCIS.2012.6664262","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper designs a distributed low-rate DoS (LDoS) attack using random walk algorithm; random walk algorithm can be used in generating power-law distribution which complies with normal network behavior feature. In this attack pattern, the behavior of each distributed attack flows are normal and nonperiodic, while the superposed effect has the same damage degree as traditional square wave LDoS attacks. As the distributed attack flow satisfies the network traffic behavior feature, it is more difficult to detect and trace attack sources. The study on the feature of this attack provides reference for distributed low-rate DoS attack countermeasures.