All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Analysis and detection of application-independent slow Denial of Service cyber attacks

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F21%3APU142406" target="_blank" >RIV/00216305:26220/21:PU142406 - isvavai.cz</a>

  • Result on the web

    <a href="https://doi.org/10.1109/ISI53945.2021.9624789" target="_blank" >https://doi.org/10.1109/ISI53945.2021.9624789</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/ISI53945.2021.9624789" target="_blank" >10.1109/ISI53945.2021.9624789</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Analysis and detection of application-independent slow Denial of Service cyber attacks

  • Original language description

    This paper investigates current applicationindependent slow Denial of Service (DoS) attacks. We propose Slowcomm and Slow Next attack models and present an attack simulation tool. We used this tool for vulnerability testing of several Internet services, including Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Secure Shell (SSH) servers. We also propose attack signatures and detection methods. We implemented these methods as an Intrusion Detection System (IDS) and tested them in an experimental network. Our testing revealed vulnerabilities in five of the six tested servers that caused the denial of service to legitimate users. Deployment of the proposed attack detector has shown a high detection success. We conclude that there is a need to increase the level of cybersecurity. Internet services are vulnerable to these new DoS attacks. Our analysis can be used for the security development of tested services. Our detector in combination with a network traffic filtering tool can be used to mitigate the attacks and keep the service available to Internet users.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

    <a href="/en/project/FW01010474" target="_blank" >FW01010474: Network Service Availability Threat Analysis, Detection and Mitigation</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2021

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    2021 IEEE International Conference on Intelligence and Security Informatics (ISI)

  • ISBN

    978-1-6654-3838-4

  • ISSN

  • e-ISSN

  • Number of pages

    6

  • Pages from-to

    1-6

  • Publisher name

    IEEE

  • Place of publication

    San Antonio, Texas, USA

  • Event location

    San Antonio

  • Event date

    Nov 2, 2021

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article