Defending against distributed denial of service (DDoS) attacks

The volume, duration and frequency of DDoS attacks have increased significantly every year. The average bandwidth of attack seen during the first quarter of 2013 was of 48.25 Gbps which is an eightfold increase over the last quarter of 2012 whereby the attack bandwidth was averaged at 5.9Gbps. The D...

Full description

Saved in:
Bibliographic Details
Main Author: Wah, Chin Han
Other Authors: Ng Wee Keong
Format: Final Year Project
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10356/55036
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-55036
record_format dspace
spelling sg-ntu-dr.10356-550362023-03-03T20:53:37Z Defending against distributed denial of service (DDoS) attacks Wah, Chin Han Ng Wee Keong School of Computer Engineering DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer system implementation The volume, duration and frequency of DDoS attacks have increased significantly every year. The average bandwidth of attack seen during the first quarter of 2013 was of 48.25 Gbps which is an eightfold increase over the last quarter of 2012 whereby the attack bandwidth was averaged at 5.9Gbps. The DDoS attacks can cripple automated systems like email, websites, bank transactions and more. With such increase in DDoS attacks over the years, the potential damage will definitely be high if left unattended. In a distributed system, data gets relayed from the source machine to the destination machine. With the modern implementation of Domain Name System (DNS) servers, the load of the incoming data may be split evenly to all the receiving servers. Thus, a coordinated DDoS attack may be split up and therefore becomes normal legit requests. Resource consumption is also an important factor in distributed systems. Therefore the relay nodes should only run the DDoS detection whenever it is necessary. To achieve a higher efficiency in the detection, the detectors have to be deployed at the nodes whereby the DDoS traffic converges so that there will be information to be aggregated for the building of a profile of the DDoS traffic. This project aims to help the systems identify the source of the DDoS attacker. The program analyzes and reassembles information from the network traffic while not interfering with the flow of the actual system. If the separate data has been reconstructed, it will be clear that the connections belong to the same DDoS profile. Hence by aggregating the network traffic at the deeper levels of the network whereby the traffic converges, it is possible to reassemble the DDoS profile. With such program monitoring the network traffic, systems can be notified of the IP addresses of the DDoS attackers and therefore deny their entries to the system. Bachelor of Engineering (Computer Science) 2013-12-04T03:40:40Z 2013-12-04T03:40:40Z 2013 2013 Final Year Project (FYP) http://hdl.handle.net/10356/55036 en Nanyang Technological University 63 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer system implementation
spellingShingle DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer system implementation
Wah, Chin Han
Defending against distributed denial of service (DDoS) attacks
description The volume, duration and frequency of DDoS attacks have increased significantly every year. The average bandwidth of attack seen during the first quarter of 2013 was of 48.25 Gbps which is an eightfold increase over the last quarter of 2012 whereby the attack bandwidth was averaged at 5.9Gbps. The DDoS attacks can cripple automated systems like email, websites, bank transactions and more. With such increase in DDoS attacks over the years, the potential damage will definitely be high if left unattended. In a distributed system, data gets relayed from the source machine to the destination machine. With the modern implementation of Domain Name System (DNS) servers, the load of the incoming data may be split evenly to all the receiving servers. Thus, a coordinated DDoS attack may be split up and therefore becomes normal legit requests. Resource consumption is also an important factor in distributed systems. Therefore the relay nodes should only run the DDoS detection whenever it is necessary. To achieve a higher efficiency in the detection, the detectors have to be deployed at the nodes whereby the DDoS traffic converges so that there will be information to be aggregated for the building of a profile of the DDoS traffic. This project aims to help the systems identify the source of the DDoS attacker. The program analyzes and reassembles information from the network traffic while not interfering with the flow of the actual system. If the separate data has been reconstructed, it will be clear that the connections belong to the same DDoS profile. Hence by aggregating the network traffic at the deeper levels of the network whereby the traffic converges, it is possible to reassemble the DDoS profile. With such program monitoring the network traffic, systems can be notified of the IP addresses of the DDoS attackers and therefore deny their entries to the system.
author2 Ng Wee Keong
author_facet Ng Wee Keong
Wah, Chin Han
format Final Year Project
author Wah, Chin Han
author_sort Wah, Chin Han
title Defending against distributed denial of service (DDoS) attacks
title_short Defending against distributed denial of service (DDoS) attacks
title_full Defending against distributed denial of service (DDoS) attacks
title_fullStr Defending against distributed denial of service (DDoS) attacks
title_full_unstemmed Defending against distributed denial of service (DDoS) attacks
title_sort defending against distributed denial of service (ddos) attacks
publishDate 2013
url http://hdl.handle.net/10356/55036
_version_ 1759853651772309504