SDToW: A Slowloris Detecting Tool for WMNs
Abstract
:1. Introduction
2. Related Works
- Our tool does not limit the number of parallel connections per user. Additionally, we do no use a timeout limitation for established connections. These behaviors can significantly increase the number of false positive errors. Moreover, limiting the number of parallel connections can block legitimate users from accessing pages with multiple objects or legitimate users behind a NAT.
- The separates modules provide efficient use of the WMN infrastructure to block the attacker—blocking the attacker near its origin, on its first AP node.
- SDToW blocks the attacker using its MAC address instead of the IP. Therefore, we avoid a legitimate user to receive a prior blacklisted IP from the DHCP server.
- Our solution detects malicious traffic without considering the expected probability of choosing between legitimate and malicious traffic. Therefore, we avoid an increase in false positive errors and resource consumption.
- Our tool has less computational complexity and thus promotes less hardware dependency to operate.
3. Analyzing Slowloris Behavior
3.1. Slowloris Traffic Analyses
3.2. HTTP Legitimate Traffic Analyses
4. SDToW
- (GET) filter.
- (Reassembled PDU) filter.
- (Packets with 296 bytes and TCP set on protocol field) filter.
SDToW Modules
- CM: collection module (CM), which acts in the Web server.
- AFM: analysis and filtering module (AFM), which works in a different node called Concentrator.
- BM: blocking module (BM), which acts in the access points.
Algorithm 1: Analysis and filtering module (AFM) |
Algorithm 2: Blocking module (BM) |
5. Results
- 5 TP-Link-Archer-C20.v4 wireless routers.
- 2 I5-4590 computers with 8 GB RAM
- 5 AMD A8-4500M notebooks with 8 GB of RAM.
- Collection count ()—time in which the CM, running on the Web server, collects information regarding the network traffic and creates the traffic list.
- Transfer list time ()—the required time to send the traffic list from CM to the Concentrator.
- Traffic list processing time ()—the required time to analyze the traffic list using the AFM filters. If it finds malicious traffic, it creates the blacklist.
- Blacklist transfer time ()—the time needed to transfer the blacklist from the AFM to the APs.
- Blocking time ()—the time required to process and block malicious IPs address from the blacklist by the BM.
5.1. Experiment 1: Measuring How the Traffic List Size Affects the Blocking Delay
5.2. Experiment 2: Measuring How the Number of Hops Affects the Blocking Delay
5.3. Experiment 3: Comparing SDToW with Snort
6. Discussion
7. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Gu, Q.; Liu, P. Denial of service attacks. In Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications; Wiley: Hoboken, NJ, USA, 2007; Volume 3, pp. 454–468. [Google Scholar]
- Tripathi, N.; Hubballi, N. Slow rate denial of service attacks against HTTP/2 and detection. Comput. Secur. 2018, 72, 255–272. [Google Scholar] [CrossRef]
- Singh, M.P.; Bhandari, A. New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges. Comput. Commun. 2020, 154, 509–527. [Google Scholar] [CrossRef]
- Goncalves, J.A.; Faria, V.S.; Vieira, G.B.; Silva, C.A.; Mascarenhas, D.M. WIDIP: Wireless distributed IPS for DDoS attacks. In Proceedings of the 2017 1st Cyber Security in Networking Conference (CSNet), Rio de Janeiro, Brazil, 18–20 October 2017; pp. 1–3. [Google Scholar]
- Yuan, H.; Xia, Y.; Yang, H.; Yuan, Y. Resilient control for wireless networked control systems under DoS attack via a hierarchical game. Int. J. Robust Nonlinear Control. 2018, 28, 4604–4623. [Google Scholar] [CrossRef]
- Karapoola, S.; Vairam, P.K.; Raman, S.; Kamakoti, V. Net-Police: A network patrolling service for effective mitigation of volumetric DDoS attacks. Comput. Commun. 2020, 150, 438–454. [Google Scholar] [CrossRef]
- Carl, G.; Kesidis, G.; Brooks, R.R.; Rai, S. Denial-of-service attack-detection techniques. IEEE Internet Comput. 2006, 10, 82–89. [Google Scholar] [CrossRef]
- Sameera, N.; Shashi, M. Deep transductive transfer learning framework for zero-day attack detection. ICT Express 2020, 6, 361–367. [Google Scholar] [CrossRef]
- Jazi, H.H.; Gonzalez, H.; Stakhanova, N.; Ghorbani, A.A. Detecting HTTP-based application layer DoS attacks on Web servers in the presence of sampling. Comput. Netw. 2017, 121, 25–36. [Google Scholar] [CrossRef]
- Toklu, S.; Şimşek, M. Two-Layer Approach for Mixed High-Rate and Low-Rate Distributed Denial of Service (DDoS) Attack Detection and Filtering. Arab. J. Sci. Eng. 2018, 43, 7923–7931. [Google Scholar] [CrossRef]
- Papadie, R.; Apostol, I. Analyzing websites protection mechanisms against DDoS attacks. In Proceedings of the 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Târgoviște, Romania, 29 June–1 July 2017; pp. 1–6. [Google Scholar]
- Matos Mascarenhas, D.; Monteiro Moraes, I. PIF and ReCiF: Efficient Interest-Packet Forwarding Mechanisms for Named-Data Wireless Mesh Networks. Information 2018, 9, 243. [Google Scholar] [CrossRef] [Green Version]
- Deng, X.; He, T.; He, L.; Gui, J.; Peng, Q. Performance analysis for IEEE 802.11 s wireless mesh network in smart grid. Wirel. Pers. Commun. 2017, 96, 1537–1555. [Google Scholar] [CrossRef]
- Vijayanand, R.; Devaraj, D.; Kannapiran, B. Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. Comput. Secur. 2018, 77, 304–314. [Google Scholar] [CrossRef]
- Sharma, R.K.; Issac, B.; Kalita, H.K. Intrusion detection and response system inspired by the defense mechanism of plants. IEEE Access 2019, 7, 52427–52439. [Google Scholar] [CrossRef]
- Sikora, M.; Gerlich, T.; Malina, L. On Detection and Mitigation of Slow Rate Denial of Service Attacks. In Proceedings of the 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Dublin, Ireland, 28–30 October 2019; pp. 1–5. [Google Scholar]
- Sivabalan, S.; Radcliffe, P.J. Feasibility of Eliminating IDPS Devices from a Web Server Farm. Int. J. Netw. Secur. 2018, 20, 433–438. [Google Scholar]
- Giunta, R.; Messina, F.; Pappalardo, G.; Tramontana, E. Augmenting a Web server with QoS by means of an aspect-oriented architecture. In Proceedings of the 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, Toulouse, France, 25–27 June 2012; pp. 179–184. [Google Scholar]
- Jyothi, V.; Wang, X.; Addepalli, S.K.; Karri, R. Brain: Behavior based adaptive intrusion detection in networks: Using hardware performance counters to detect ddos attacks. In Proceedings of the 2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID), Kolkata, India, 4–8 January 2016; pp. 587–588. [Google Scholar]
- Labonne, M.; Olivereau, A.; Polve, B.; Zeghlache, D. Unsupervised protocol-based intrusion detection for real-world networks. In Proceedings of the 2020 International Conference on Computing, Networking and Communications (ICNC), Big Island, HI, USA, 17–20 February 2020; pp. 299–303. [Google Scholar]
- Agrawal, N.; Tapaswi, S. Low rate cloud DDoS attack defense method based on power spectral density analysis. Inf. Process. Lett. 2018, 138, 44–50. [Google Scholar] [CrossRef]
- Shorey, T.; Subbaiah, D.; Goyal, A.; Sakxena, A.; Mishra, A.K. Performance Comparison and Analysis of Slowloris, GoldenEye and Xerxes DDoS Attack Tools. In Proceedings of the 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, India, 19–22 September 2018; pp. 318–322. [Google Scholar]
- Damon, E.; Dale, J.; Laron, E.; Mache, J.; Land, N.; Weiss, R. Hands-on denial of service lab exercises using slowloris and rudy. In Proceedings of the 2012 Information Security Curriculum Development Conference, Kennesaw, GA, USA, 12–13 October 2012; pp. 21–29. [Google Scholar]
- Sultana, N.; Bose, S.; Loo, B.T. An extensible evaluation system for DoS research. In Proceedings of the 2019 11th International Conference on Communication Systems & Networks (COMSNETS), Bangalore, India, 7–11 January 2019; pp. 344–351. [Google Scholar]
- De Sousa Araújo, T.E.; Matos, F.M.; Moreira, J.A. Intrusion detection systems’ performance for distributed denial-of-service attack. In Proceedings of the 2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON), Pucón, Chile, 18–20 October 2017; pp. 1–6. [Google Scholar]
- Park, W.; Ahn, S. Performance comparison and detection analysis in snort and suricata environment. Wirel. Pers. Commun. 2017, 94, 241–252. [Google Scholar] [CrossRef]
- Day, D.; Burns, B. A performance analysis of snort and suricata network intrusion detection and prevention engines. In Proceedings of the Fifth International Conference on Digital Society, Gosier, Guadeloupe, France, 23–28 February 2011; pp. 187–192. [Google Scholar]
- Habib, B.; Khurshid, F.; Dar, A.H.; Shah, Z. DDoS Mitigation in Eucalyptus Cloud Platform Using Snort and Packet Filtering—IP-Tables. In Proceedings of the 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 21–22 November 2019; pp. 546–550. [Google Scholar]
- Roldán, J.; Boubeta-Puig, J.; Martínez, J.L.; Ortiz, G. Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks. Expert Syst. Appl. 2020, 149, 113251. [Google Scholar] [CrossRef]
- Ujjan, R.M.A.; Pervez, Z.; Dahal, K.; Bashir, A.K.; Mumtaz, R.; González, J. Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN. Future Gener. Comput. Syst. 2020, 111, 763–779. [Google Scholar] [CrossRef]
- Hu, Q.; Yu, S.Y.; Asghar, M.R. Analysing performance issues of open-source intrusion detection systems in high-speed networks. J. Inf. Secur. Appl. 2020, 51, 102426. [Google Scholar] [CrossRef]
- Corrêa, J.H.G.; Junior, E.A.S.; Fonseca, I.E.; Nigam, V.; Ribeiro, M.R.; Villaça, R.S. Selectivity and Autoscaling as Complementary Defenses for DDoS Protection to Cloud Services. In Proceedings of the 2019 IEEE 8th International Conference on Cloud Networking (CloudNet), Coimbra, Portugal, 4–6 November 2019; pp. 1–3. [Google Scholar]
- Durcekova, V.; Schwartz, L.; Shahmehri, N. Sophisticated denial of service attacks aimed at application layer. In Proceedings of the 2012 ELEKTRO, Rajeck Teplice, Slovakia, 21–22 May 2012; pp. 55–60. [Google Scholar]
- Kim, J.; Kim, H.S. Intrusion Detection Based on Spatiotemporal Characterization of Cyberattacks. Electronics 2020, 9, 460. [Google Scholar] [CrossRef] [Green Version]
- Singh, K.J.; De, T. MLP-GA based algorithm to detect application layer DDoS attack. J. Inf. Secur. Appl. 2017, 36, 145–153. [Google Scholar] [CrossRef]
- Chiba, Z.; Abghour, N.; Moussaid, K.; Rida, M. Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms. Comput. Secur. 2019, 86, 291–317. [Google Scholar] [CrossRef]
- Yao, Y.; Su, L.; Zhang, C.; Lu, Z.; Liu, B. Marrying graph kernel with deep neural network: A case study for network anomaly detection. In International Conference on Computational Science; Springer: Berlin/Heidelberg, Germany, 2019; pp. 102–115. [Google Scholar]
- Rosay, A.; Carlier, F.; Leroux, P. Feed-forward neural network for Network Intrusion Detection. In Proceedings of the 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), Antwerp, Belgium, 25–28 May 2020; pp. 1–6. [Google Scholar]
- Ferrag, M.A.; Maglaras, L.; Moschoyiannis, S.; Janicke, H. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl. 2020, 50, 102419. [Google Scholar] [CrossRef]
- Tang, T.A.; McLernon, D.; Mhamdi, L.; Zaidi, S.A.R.; Ghogho, M. Intrusion detection in sdn-based networks: Deep recurrent neural network approach. In Deep Learning Applications for Cyber Security; Springer: Berlin/Heidelberg, Germany, 2019; pp. 175–195. [Google Scholar]
- Chastikova, V.; Sotnikov, V. Method of analyzing computer traffic based on recurrent neural networks. J. Phys. Conf. Ser. 2019, 1353, 012133. [Google Scholar] [CrossRef]
- Tripathi, N.; Hubballi, N.; Singh, Y. How secure are Web servers? An empirical study of slow HTTP DoS attacks and detection. In Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 31 August–2 September 2016; pp. 454–463. [Google Scholar]
- Velan, P.; Jirsik, T. On the Impact of Flow Monitoring Configuration. In Proceedings of the NOMS 2020—2020 IEEE/IFIP Network Operations and Management Symposium, Kissimee, FL, USA, 20–24 April 2020; pp. 1–7. [Google Scholar]
- Vishnu, N.; Batth, R.S.; Singh, G. Denial of Service: Types, Techniques, Defence Mechanisms and Safe Guards. In Proceedings of the 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Dubai, UAE, 11–12 December 2019; pp. 695–700. [Google Scholar]
- Montagud, M.; De Rus, J.A.; Fayos-Jordan, R.; Garcia-Pineda, M.; Segura-Garcia, J. Open-source software tools for measuring resources consumption and DASH metrics. In Proceedings of the 11th ACM Multimedia Systems Conference, Istanbul, Turkey, 8–11 June 2020; pp. 261–266. [Google Scholar]
- Goyal, P.; Goyal, A. Comparative study of two most popular packet sniffing tools-Tcpdump and Wireshark. In Proceedings of the 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN), Girne, Cyprus, 16–17 September 2017; pp. 77–81. [Google Scholar]
- Langthasa, B.; Acharya, B.; Sarmah, S. Classification of network traffic in LAN. In Proceedings of the 2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV), Shillong, India, 29–30 January 2015; pp. 92–99. [Google Scholar]
- Jain, R.; Kashyap, I. An QoS aware link defined OLSR (LD-OLSR) routing protocol for MANETs. Wirel. Pers. Commun. 2019, 108, 1745–1758. [Google Scholar] [CrossRef]
- Jevtic, N.J.; Malnar, M.Z. Novel ETX-Based Metrics for Overhead Reduction in Dynamic Ad Hoc Networks. IEEE Access 2019, 7, 116490–116504. [Google Scholar] [CrossRef]
- Fainelli, F. The OpenWrt embedded development framework. In Proceedings of the Free and Open Source Software Developers European Meeting, Bengaluru, India, 4–8 January 2008; p. 106. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Faria, V.d.S.; Gonçalves, J.A.; Silva, C.A.M.d.; Vieira, G.d.B.; Mascarenhas, D.M. SDToW: A Slowloris Detecting Tool for WMNs. Information 2020, 11, 544. https://doi.org/10.3390/info11120544
Faria VdS, Gonçalves JA, Silva CAMd, Vieira GdB, Mascarenhas DM. SDToW: A Slowloris Detecting Tool for WMNs. Information. 2020; 11(12):544. https://doi.org/10.3390/info11120544
Chicago/Turabian StyleFaria, Vinicius da Silva, Jéssica Alcântara Gonçalves, Camilla Alves Mariano da Silva, Gabriele de Brito Vieira, and Dalbert Matos Mascarenhas. 2020. "SDToW: A Slowloris Detecting Tool for WMNs" Information 11, no. 12: 544. https://doi.org/10.3390/info11120544
APA StyleFaria, V. d. S., Gonçalves, J. A., Silva, C. A. M. d., Vieira, G. d. B., & Mascarenhas, D. M. (2020). SDToW: A Slowloris Detecting Tool for WMNs. Information, 11(12), 544. https://doi.org/10.3390/info11120544