{"title":"通过分析客户端响应模式检测DDoS攻击","authors":"Y. Soejima, E. Chen, H. Fuji","doi":"10.1109/SAINTW.2005.56","DOIUrl":null,"url":null,"abstract":"Distributed Denial of Service (DDoS) attacks is becoming a serious threat on the Internet. Not only network professionals but also end users are now aware of the attacks. Most of these attacks simply flood a massive amount of packets towards a target. In this paper, we propose to detect DDoS attacks by analyzing client response patterns after the reply packets from the server are intentionally delayed. While legitimate clients would react to such delay by decreasing their sending rates, malicious clients would simply keep on flooding the server. The effectiveness of this proposal is evaluated using our prototype.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Detecting DDoS Attacks by Analyzing Client Response Patterns\",\"authors\":\"Y. Soejima, E. Chen, H. Fuji\",\"doi\":\"10.1109/SAINTW.2005.56\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Distributed Denial of Service (DDoS) attacks is becoming a serious threat on the Internet. Not only network professionals but also end users are now aware of the attacks. Most of these attacks simply flood a massive amount of packets towards a target. In this paper, we propose to detect DDoS attacks by analyzing client response patterns after the reply packets from the server are intentionally delayed. While legitimate clients would react to such delay by decreasing their sending rates, malicious clients would simply keep on flooding the server. The effectiveness of this proposal is evaluated using our prototype.\",\"PeriodicalId\":220913,\"journal\":{\"name\":\"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-01-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SAINTW.2005.56\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAINTW.2005.56","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detecting DDoS Attacks by Analyzing Client Response Patterns
Distributed Denial of Service (DDoS) attacks is becoming a serious threat on the Internet. Not only network professionals but also end users are now aware of the attacks. Most of these attacks simply flood a massive amount of packets towards a target. In this paper, we propose to detect DDoS attacks by analyzing client response patterns after the reply packets from the server are intentionally delayed. While legitimate clients would react to such delay by decreasing their sending rates, malicious clients would simply keep on flooding the server. The effectiveness of this proposal is evaluated using our prototype.