{"title":"区分Flash人群与欺骗性DoS攻击的方法","authors":"Quyen Le, M. Zhanikeev, Y. Tanaka","doi":"10.1109/NGI.2007.371212","DOIUrl":null,"url":null,"abstract":"Web services have become an indispensable part of the Internet and the world. We have learned their applicability in every aspects of human life which lead to the huge amount of Web traffic exchanged over the Internet everyday. This excessive popularity is also the cause that led to some troubles. Among them, Flash crowds and Denial of Service (DoS) attacks are the two major concerns for the stability and safety of the Web services. So far, there are some methods that can detect the occurrences of these incidents in network traffic, however it still remains unclear how to explicitly distinguish DoS attacks and Flash crowds as these anomalies are very much alike. In this paper, we present various analyses on traffic traces of DoS attacks and Flash crowds to prove that even though DoS attacks mimic Flash crowds, there are still several differences in various aspects of these two incidents. As long as Flash crowd is an unusual traffic phenomenon of web user communities, there must be some features that a single DoS attacker cannot imitate. We specially focused on the source distribution and the variation pattern in traffic and archived remarkable results.","PeriodicalId":207883,"journal":{"name":"2007 Next Generation Internet Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":"{\"title\":\"Methods of Distinguishing Flash Crowds from Spoofed DoS Attacks\",\"authors\":\"Quyen Le, M. Zhanikeev, Y. Tanaka\",\"doi\":\"10.1109/NGI.2007.371212\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Web services have become an indispensable part of the Internet and the world. We have learned their applicability in every aspects of human life which lead to the huge amount of Web traffic exchanged over the Internet everyday. This excessive popularity is also the cause that led to some troubles. Among them, Flash crowds and Denial of Service (DoS) attacks are the two major concerns for the stability and safety of the Web services. So far, there are some methods that can detect the occurrences of these incidents in network traffic, however it still remains unclear how to explicitly distinguish DoS attacks and Flash crowds as these anomalies are very much alike. In this paper, we present various analyses on traffic traces of DoS attacks and Flash crowds to prove that even though DoS attacks mimic Flash crowds, there are still several differences in various aspects of these two incidents. As long as Flash crowd is an unusual traffic phenomenon of web user communities, there must be some features that a single DoS attacker cannot imitate. We specially focused on the source distribution and the variation pattern in traffic and archived remarkable results.\",\"PeriodicalId\":207883,\"journal\":{\"name\":\"2007 Next Generation Internet Networks\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-05-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"20\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 Next Generation Internet Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NGI.2007.371212\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 Next Generation Internet Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NGI.2007.371212","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Methods of Distinguishing Flash Crowds from Spoofed DoS Attacks
Web services have become an indispensable part of the Internet and the world. We have learned their applicability in every aspects of human life which lead to the huge amount of Web traffic exchanged over the Internet everyday. This excessive popularity is also the cause that led to some troubles. Among them, Flash crowds and Denial of Service (DoS) attacks are the two major concerns for the stability and safety of the Web services. So far, there are some methods that can detect the occurrences of these incidents in network traffic, however it still remains unclear how to explicitly distinguish DoS attacks and Flash crowds as these anomalies are very much alike. In this paper, we present various analyses on traffic traces of DoS attacks and Flash crowds to prove that even though DoS attacks mimic Flash crowds, there are still several differences in various aspects of these two incidents. As long as Flash crowd is an unusual traffic phenomenon of web user communities, there must be some features that a single DoS attacker cannot imitate. We specially focused on the source distribution and the variation pattern in traffic and archived remarkable results.