• DocumentCode
    3136294
  • Title

    Beyond the perimeter: the need for early detection of denial of service attacks

  • Author

    Haggerty, John ; Shi, Qi ; Merabti, Madjid

  • Author_Institution
    Liverpool John Moores Univ., UK
  • fYear
    2002
  • fDate
    2002
  • Firstpage
    413
  • Lastpage
    422
  • Abstract
    The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However, as the case study and analysis in this paper make apparent, the perimeter model, which relies on firewalls and intrusion detection systems, is unable to provide an effective defence against DoS attacks. Therefore, there is a need for a new approach; one that identifies an attack beyond the perimeter. We present such an approach. We achieve early detection of DoS attacks by the identification of traffic signatures which indicate that an attack is underway. As these signatures can be identified ´outside´ the perimeter, appropriate measures can be taken to prevent the attack from succeeding. We use examples of DoS attacks and a case study to demonstrate the applicability of our approach.
  • Keywords
    computer networks; network operating systems; security of data; telecommunication security; computer network security; countermeasures; denial of service attack detection; firewalls; intrusion detection systems; network attacks; network security; network traffic signatures; organisations; perimeter model; Application software; Authentication; Availability; Communication system traffic control; Computer crime; Computer security; Intrusion detection; Law; Legal factors; Traffic control;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Applications Conference, 2002. Proceedings. 18th Annual
  • ISSN
    1063-9527
  • Print_ISBN
    0-7695-1828-1
  • Type

    conf

  • DOI
    10.1109/CSAC.2002.1176313
  • Filename
    1176313