Skip to main navigation Skip to search Skip to main content

Detecting Service Violations and DoS Attacks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Denial of Service (DoS) attacks are a serious threat for the Internet. DoS attacks can consume memory, CPU, and network resources and damage or shut down the operation of the resource under attack (victim). The quality of service (QoS) enabled networks, which offer different levels of service, are vulnerable to QoS attacks as well as DoS attacks. The aim of a QoS attack is to steal network resources, e.g., bandwidth, or to degrade the service perceived by users. We present a classification and a brief explanation of the approaches used to deal with the DoS and QoS attacks. Furthermore, we propose network monitoring techniques to detect service violations and to infer DoS attacks. Finally, a quantitative comparison among all schemes is conducted, in which, we highlight the merits of each scheme and estimate the overhead (both processing and communication) introduced by it. The comparison provides guidelines for selecting the appropriate scheme, or a combination of schemes, based on the requirements and how much overhead can be tolerated.

Original languageEnglish
Title of host publicationProceedings of the Symposium on Network and Distributed System Security, NDSS 2003
PublisherThe Internet Society
ISBN (Electronic)1891562169, 9781891562167
Publication statusPublished - 2003
Externally publishedYes
Event10th Symposium on Network and Distributed System Security, NDSS 2003 - San Diego, United States
Duration: 6 Feb 20036 Feb 2003

Publication series

NameProceedings of the Symposium on Network and Distributed System Security, NDSS 2003

Conference

Conference10th Symposium on Network and Distributed System Security, NDSS 2003
Country/TerritoryUnited States
CitySan Diego
Period6/02/036/02/03

Fingerprint

Dive into the research topics of 'Detecting Service Violations and DoS Attacks'. Together they form a unique fingerprint.

Cite this