Show simple item record

dc.contributor.advisorBriceño Pineda, Wilsonspa
dc.contributor.advisorParra Valencia, Jorge Andrickspa
dc.contributor.authorNiño Díaz, Angélica Maríaspa
dc.contributor.authorGuerrero, Cesar D.spa
dc.coverage.spatialBucaramanga (Santander, Colombia)spa
dc.coverage.temporal2014spa
dc.date.accessioned2021-03-02T15:00:18Z
dc.date.available2021-03-02T15:00:18Z
dc.date.issued2014-10-28
dc.identifier.isbnISBN: 978-958-8166-65-0
dc.identifier.urihttp://hdl.handle.net/20.500.12749/12349
dc.description.abstractLos ataques de denegación de servicio han tenido una sofisticación cada vez mayor que exige nuevas soluciones por parte de la comunidad científica. Los sistemas de detección de intrusiones utilizan técnicas de detección regulares al inspeccionar los encabezados de los paquetes IP entre diferentes reglas para cada tipo de ataque. Un enfoque más simple presentado en este documento se basa en la estimación del ancho de banda disponible como una métrica para determinar la variación inesperada en el consumo de ancho de banda como un indicador de un posible ataque DoS. Utilizando una versión modificada de la herramienta Traceband, mostramos que es posible identificar diferentes tipos de ataques de inundación implementando criterios de acuerdo con los estados del Modelo Oculto de Markov utilizado para establecer valores de estimación de ancho de banda disponible.spa
dc.format.mimetypeapplication/pdfspa
dc.language.isospaspa
dc.relation.urihttps://repository.unab.edu.co/handle/20.500.12749/12263
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/2.5/co/*
dc.sourceColección de investigaciones en innovación y apropiación de las tecnologías de la información y las comunicaciones CIINATIC 2014
dc.sourceColección de investigaciones en innovación y apropiación de las tecnologías de la información y las comunicaciones CIINATIC 2014; Volumen 1 (2014); páginas 137-142
dc.titleDetección de ataques de denegación de servicio basada en la estimación del ancho de banda disponiblespa
dc.title.translatedDenial of service attacks detection based on available bandwidth estimationspa
dc.publisher.grantorUniversidad Autónoma de Bucaramanga UNABspa
dc.rights.localAbierto (Texto Completo)spa
dc.publisher.facultyFacultad Ingenieríaspa
dc.publisher.programPregrado Ingeniería de sistemasspa
dc.type.driverinfo:eu-repo/semantics/conferenceProceedings
dc.type.localMemoria de eventosspa
dc.type.coarhttp://purl.org/coar/resource_type/c_f744
dc.subject.keywordsDoSeng
dc.subject.keywordsAvailable bandwidth estimationeng
dc.subject.keywordsDetection denial of service attackseng
dc.subject.keywordsNetwork monitoringeng
dc.subject.keywordsTracebandeng
dc.subject.keywordsEngineering in Computer Scienceeng
dc.subject.keywordsDocument managementeng
dc.subject.keywordsEducationeng
dc.subject.keywordsBusinesseng
dc.subject.keywordsEngineering educationeng
dc.identifier.instnameinstname:Universidad Autónoma de Bucaramanga - UNABspa
dc.identifier.reponamereponame:Repositorio Institucional UNABspa
dc.type.hasversioninfo:eu-repo/semantics/acceptedVersion
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.accessrightshttp://purl.org/coar/access_right/c_abf2spa
dc.relation.referencesD. Kaur and M. Sachdeva, “Study of Recent DDoS Attacks and Defense Evaluation Approaches,” ijetae.com, vol. 3, no. 1, pp. 332–336, 2013.spa
dc.relation.referencesS. Ning and Q. Han, “Design and implementation of DDoS attack and defense testbed,” pp. 220–223, 2012.spa
dc.relation.referencesD. Kaur, M. Sachdeva, and K. Kumar, “Study of DDoS attacks using DETER Testbed,” researchmanuscripts.com, vol. 3, no. 2, p. 13, 2012.spa
dc.relation.referencesR. Chertov, S. Fahmy, and N. B. Shroff, “Emulation versus Simulation: A Case Study TCP-Targeted Denial of Service Attacks,” in 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006., pp. 316–325spa
dc.relation.referencesC. D. Guerrero and M. A. Labrador, “On the applicability of available bandwidth estimation techniques and tools,” Computer Communications, vol. 33, no. 1, pp. 11–22, Jan. 2010.spa
dc.relation.referencesC. D. Guerrero and M. A. Labrador, “Traceband: A fast, low overhead and accurate tool for available bandwidth estimation and monitoring,” Computer Networks, vol. 54, no. 6, pp. 977–990, Apr. 2010.spa
dc.relation.referencesL. He, S. Yu, and M. Li, “Anomaly Detection Based on Available Bandwidth Estimation,” in 2008 IFIP International Conference on Network and Parallel Computing, 2008, pp. 176–183.spa
dc.relation.referencesL. He, B. Tang, and S. Yu, “Available bandwidth estimation and its application in detection of DDoS attacks,” in 2008 11th IEEE Singapore International Conference on Communication Systems, 2008, pp. 1187–1191.spa
dc.relation.referencesM. Alenezi and M. J. Reed, “Denial of service detection through TCP congestion window analysis,” in World Congress on Internet Security (WorldCIS-2013), 2013, pp. 145–150.spa
dc.relation.referencesG. Carl, G. Kesidis, R. R. Brooks, and S. Rai, “Denial-of-service attackdetection techniques,” IEEE Internet Computing, vol. 10, no. 1, pp. 82–89, Jan. 2006.spa
dc.relation.references“Multi-Generator (MGEN) | Networks and Communication Systems Branch.” [Online]. Available: http://www.nrl.navy.mil/itd/ncs/products/mgen. [Accessed: 10-Jun2014].spa
dc.relation.referencesA. Hussain, S. Schwab, R. Thomas, and S. Fahmy, “DDoS experiment methodology,” Proceedings of the DETER Community Workshop on Cyber Security Experimentation (Vol. 8), 2006.spa
dc.contributor.cvlachttps://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000457280*
dc.contributor.cvlachttps://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000160326*
dc.contributor.googlescholarhttps://scholar.google.es/citations?hl=es&user=_YgBOOcAAAAJ*
dc.contributor.googlescholarhttps://scholar.google.es/citations?hl=es&user=O7IQH-AAAAAJ*
dc.contributor.orcidhttps://orcid.org/0000-0002-3286-6226*
dc.contributor.orcidhttps://orcid.org/0000-0002-2060-6419*
dc.contributor.scopushttps://www.scopus.com/authid/detail.uri?authorId=57194112517*
dc.contributor.researchgatehttps://www.researchgate.net/profile/Angelica-Nino-Diaz*
dc.contributor.researchgatehttps://www.researchgate.net/profile/Cesar-Guerrero-2*
dc.contributor.researchgatehttps://www.researchgate.net/profile/Wilson_Briceno*
dc.contributor.researchgatehttps://www.researchgate.net/profile/Jorge_Parra_Valencia*
dc.subject.lembIngeniería en ciencias de la computaciónspa
dc.subject.lembGestión de documentosspa
dc.subject.lembEducaciónspa
dc.subject.lembEmpresaspa
dc.subject.lembEducación en ingenieríaspa
dc.identifier.repourlrepourl:https://repository.unab.edu.cospa
dc.description.abstractenglishDenial of Service Attacks have had an increasing sophistication that demands new solutions from the scientific community. Intrusion Detection Systems use regular detection techniques by inspecting IP packet headers among different rules for each type of attack. A simpler approach presented in this paper is based on the available bandwidth estimation as a metric to determine the unexpected variation in the bandwidth consumption as an indicator of a possible DoS attack. Using a modified version of the tool Traceband, we show that is possible to identify different types of flooding attacks implementing criteria according to the states of the Markov Hidden Model used to establish available bandwidth estimation values.eng
dc.subject.proposalDoSspa
dc.subject.proposalEstimación de ancho de banda disponiblespa
dc.subject.proposalDetección ataques de denegación de serviciospa
dc.subject.proposalMonitoreo de redspa
dc.subject.proposalTracebandspa
dc.type.redcolhttp://purl.org/redcol/resource_type/EC_AC
dc.rights.creativecommonsAtribución-NoComercial-SinDerivadas 2.5 Colombia*


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Atribución-NoComercial-SinDerivadas 2.5 Colombia
Except where otherwise noted, this item's license is described as Atribución-NoComercial-SinDerivadas 2.5 Colombia