Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/97756
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Computing | - |
| dc.creator | Miu, Tung Ngai | - |
| dc.identifier.uri | https://theses.lib.polyu.edu.hk/handle/200/12228 | - |
| dc.language.iso | English | - |
| dc.title | Defending against advanced DDoS attacks | - |
| dc.type | Thesis | - |
| dcterms.abstract | Distributed denial of service (DDoS) attacks have been a severe threat to the Internet for decades. Although many detection and defense mechanisms have been proposed, the attackers always attempt to evade the detection by adopting various sophisticated approaches. In this thesis, we investigate such advanced DDoS attacks from three aspects. First, we inspect application layer DDoS attacks because their attack requests can be the same as benign ones for evasion and exhaust the computational resources of target servers. Specifically, we first design a new approach to model users' browsing behaviors and use it to differentiate between attacks and benign visits at both session and page level. Then, we develop an effective defense system named SkyShield that leverages the sketch data structure to detect and mitigate application-layer DDoS attacks quickly. Second, network layer volumetric attacks are becoming even more popular with the emergence of the DDoS-as-a-service economy, and most attacks are launched abruptly. Hence, a defense system should adopt an effective process to detect and mitigate the attacks as soon as possible. Since different DDoS protection services (DPS) adopt diverse defense strategies, we characterize the Border Gateway Protocol (BGP)-based DPSes by proposing a machine learning based approach to analyze BGP update messages. Third, to better understand the trends of DDoS amplification attacks, we deploy DDoSTrap, a high-performance honeypot to collect data and report interesting observations after analyzing 4-year data. We conducted extensive experiments to evaluate the proposed approaches, and the experimental results demonstrate their effectiveness. Moreover, our findings shed light on the trends of DDoS attacks and the design of effective DDoS attack mitigation schemes. | - |
| dcterms.accessRights | open access | - |
| dcterms.educationLevel | M.Phil. | - |
| dcterms.extent | xiv, 94 pages : color illustrations | - |
| dcterms.issued | 2022 | - |
| dcterms.LCSH | Computer networks -- Security measures | - |
| dcterms.LCSH | Denial of service attacks | - |
| dcterms.LCSH | Hong Kong Polytechnic University -- Dissertations | - |
| Appears in Collections: | Thesis | |
Access
View full-text via https://theses.lib.polyu.edu.hk/handle/200/12228
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.


