Change search
ReferencesLink to record
Permanent link

Direct link
A simulation study of an application layer DDoS detection mechanism
KTH, School of Information and Communication Technology (ICT).
KTH, School of Information and Communication Technology (ICT).
2016 (English)Independent thesis Advanced level (professional degree), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

Over the last couple of years the rise of application layer Distributed Denial of Service (DDoS) attacks has significantly increased. Because of this, many issues have been raised on how organizations and companies can protect themselves from intrusions and damages against their systems and services. The consequences from these attacks are many, ranging from revenue losses for companies to stolen personal data. As the technologies are evolving, application layer DDoS attacks are becoming more effective and there is not a concrete solution that entirely protects against them.

This thesis focuses on the available defense mechanisms and presents a general overview of different types of application layer DDoS attacks and how they are constructed. Moreover this report provides a simulation based on one of the defense mechanisms mentioned, named CALD. The simulation tested two different application layer DDoS attacks and showed that CALD can detect and differentiate between the two attacks.

This report can be used as a general information source for application layer DDoS attacks, how to detect them and how to defend against them. Furthermore the simulation can be used as a basis on how well a relatively small-scaled implementation of CALD can detect DDoS attacks on the application layer.

Abstract [sv]

Under de senaste åren har ökningen av Distributed Denial of Service (DDoS) attacker på applikationslagret ökat markant. På grund av detta har många frågor uppkommit om hur organisationer och företag kan skydda sig mot intrång och skador mot sina system och tjänster. Konsekvenserna av dessa attacker är många, allt från intäktsförluster för företag till stulen personlig data. Eftersom tekniken utvecklas, har DDoS attacker på applikationslagret blivit mer effektiva och det finns inte en konkret lösning för att hindra dem.

Denna rapport fokuserar på de tillgängliga försvarsmekanismer och presenterar en allmän översikt över olika typer av DDoS-attacker på applikationslagret och hur de är uppbyggda. Dessutom bidrar den här rapporten med en redovisning av en simulering baserad på en av de försvarsmekanismer som nämns i rapporten, CALD. Simuleringen testade två olika attacker på applikationslagret och visar att CALD kan upptäcka och skilja mellan de två attackerna.

Denna rapport kan användas som en allmän informationskälla för DDoSattacker på applikationslagret och hur man försvarar sig mot och upptäcker dessa. Vidare kan simuleringen användas som utgångspunkt på hur väl en relativt småskalig implementering av CALD kan upptäcka DDoS-attacker på applikationslagret.

Place, publisher, year, edition, pages
2016. , 43 p.
Series
TRITA-ICT-EX, 2016:108
Keyword [en]
Distributed Denial of Service attacks, DDoS, application layer, detection, defense
Keyword [sv]
Distributed Denial of Service attacks, DDoS, application layer, detection, defense
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-191145OAI: oai:DiVA.org:kth-191145DiVA: diva2:955075
Subject / course
Information and Communication Technology
Educational program
Master of Science in Engineering - Information and Communication Technology
Examiners
Available from: 2016-08-24 Created: 2016-08-24 Last updated: 2016-08-24Bibliographically approved

Open Access in DiVA

fulltext(3018 kB)10 downloads
File information
File name FULLTEXT01.pdfFile size 3018 kBChecksum SHA-512
398df4768f0f4a274a0cfacbb37c796c6aedd78a74af4ec0b803789a725f913fa4061097b0562e2b3606686b121cc44563133b8e2cf31a935ca5bb60dd217032
Type fulltextMimetype application/pdf

By organisation
School of Information and Communication Technology (ICT)
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 10 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 43 hits
ReferencesLink to record
Permanent link

Direct link