Choosing an appropriate architecture to protect the information system from multi-level DDOS attacks

DOI: 10.31673/2409-7292.2021.013540

Authors

  • В. В. Бородань, (Borodan V. V.) State University of Telecommunications, Kyiv
  • Д. О. Гай, (Guy D.O.) State University of Telecommunications, Kyiv

DOI:

https://doi.org/10.31673/2409-7292.2021.013540

Abstract

The paper examines multi-level DDoS attacks, which are a type of denial of service (DoS) attack, which aims to
ban network services by failing target servers or consuming their resources, so that these servers can no longer provide
services to legitimate users. DDoS attacks are divided into several classes, which include: Telnet brute force attack,
SYN flood attack, ICMP flood attack, Smurf attack, Ping flood, HTTP Get Flooding request attack and HTTP Post. It is
concluded that in order to create an effective information security architecture and, at the same time, effective measures
to combat DDoS attacks, it is important to understand the different methods of DDoS. The architecture of information
system protection against multilevel DDoS-attacks based on SDN and analysis of network traffic correlation is
presented. Recommendations for protecting the information system from multi-level DDoS-attacks have been
developed. It is noted that in addition to technical measures, organizations also need to implement procedural measures
at the level of protection, detection and response.

Keywords: attack, DDOS, information security, SYN, Flood, OSI model, multilevel attacks.

References
1. Shui Yu. An Overview of DDoS Attacks. In Distributed Denial of Service Attack and Defense, pages 1–14. Springer, 2014.
2. Michele De Donno, Nicola Dragoni, Alberto Giaretta, and Angelo Spognardi. Analysis of DDoS-Capable IoT Malwares. In Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS), pages 807–816. IEEE, 2017.
3. Обзор киберугроз 2020. https://techexpert.ua/ru/cybersecurity-covid/
4. Какими были DDoS-атаки сетевого уровня в 4-м квартале 2020-го. https://vasexperts.ru/blog/bezopasnost/ddos-ataki-2020-go/
5. Mahjabin, Tasnuva & Xiao, Yang & Sun, Guang & Jiang, Wangdong. (2017). A survey of distributed denial-of-service attack, prevention, and mitigation techniques. International Journal of Distributed Sensor Networks. 13. 155014771774146. 10.1177/1550147717741463.
6. Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, and Ren Ping Liu. A System for Denialof-Service Attack Detection based on Multivariate Correlation Analysis. IEEE Transactions on Parallel and Distributed Systems, 25(2):447–456, 2014.
7. Ying-Dar Lin, Po-Ching Lin, Chih-Hung Yeh, Yao-Chun Wang, and Yuan-Cheng Lai. An Extended SDN Architecture for Network Func- tion Virtualization with a Case Study on Intrusion Prevention. IEEE Network, 29(3):48–53, 2015.
8. Bing Wang, Yao Zheng, Wenjing Lou, and Y Thomas Hou. DDoS Attack Protection in the Era of Cloud Computing and Software- Defined Networking. Computer Networks, 81:308–319, 2015.

Published

2021-06-02

Issue

Section

Articles