DocumentCode :
3136294
Title :
Beyond the perimeter: the need for early detection of denial of service attacks
Author :
Haggerty, John ; Shi, Qi ; Merabti, Madjid
Author_Institution :
Liverpool John Moores Univ., UK
fYear :
2002
fDate :
2002
Firstpage :
413
Lastpage :
422
Abstract :
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However, as the case study and analysis in this paper make apparent, the perimeter model, which relies on firewalls and intrusion detection systems, is unable to provide an effective defence against DoS attacks. Therefore, there is a need for a new approach; one that identifies an attack beyond the perimeter. We present such an approach. We achieve early detection of DoS attacks by the identification of traffic signatures which indicate that an attack is underway. As these signatures can be identified ´outside´ the perimeter, appropriate measures can be taken to prevent the attack from succeeding. We use examples of DoS attacks and a case study to demonstrate the applicability of our approach.
Keywords :
computer networks; network operating systems; security of data; telecommunication security; computer network security; countermeasures; denial of service attack detection; firewalls; intrusion detection systems; network attacks; network security; network traffic signatures; organisations; perimeter model; Application software; Authentication; Availability; Communication system traffic control; Computer crime; Computer security; Intrusion detection; Law; Legal factors; Traffic control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2002. Proceedings. 18th Annual
ISSN :
1063-9527
Print_ISBN :
0-7695-1828-1
Type :
conf
DOI :
10.1109/CSAC.2002.1176313
Filename :
1176313
Link To Document :
بازگشت