National Repository of Grey Literature 2 records found  Search took 0.01 seconds. 
Slow rate DoS attacks independent of application layer protocol
Richter, Dominik ; Münster, Petr (referee) ; Sikora, Marek (advisor)
This bachelor thesis is focused on the development of a generator of Slow DoS attacks independent of the application layer protocol and a system capable of detecting these attacks. These attacks are characterized by the use of very low bandwidth and similarities to legitimate user traffic on the network. This makes them very effective and difficult to detect. In addition, they can be applied to multiple ISO/OSI application layer protocols, such as FTP, SSH, or HTTP. Specifically, the work deals with Slowcomm, Slow Next and SlowReq attacks. In the introduction, the reader is introduced to three application layer protocols, on which the implemented attacks will be presented and tested. Next, the individual Slow DoS attacks and the procedure of their implementation in the test environment are described in more detail. Subsequently, an IDS detection system was created, which is able to detect the ongoing attack generated by the created generator. Its implementation was also described. The results show that Slow DoS attacks are able to prevent access to the target service faster and more effectively than conventional flood attacks. The detection system, on the other hand, is able to detect them.
Slow rate DoS attacks independent of application layer protocol
Richter, Dominik ; Münster, Petr (referee) ; Sikora, Marek (advisor)
This bachelor thesis is focused on the development of a generator of Slow DoS attacks independent of the application layer protocol and a system capable of detecting these attacks. These attacks are characterized by the use of very low bandwidth and similarities to legitimate user traffic on the network. This makes them very effective and difficult to detect. In addition, they can be applied to multiple ISO/OSI application layer protocols, such as FTP, SSH, or HTTP. Specifically, the work deals with Slowcomm, Slow Next and SlowReq attacks. In the introduction, the reader is introduced to three application layer protocols, on which the implemented attacks will be presented and tested. Next, the individual Slow DoS attacks and the procedure of their implementation in the test environment are described in more detail. Subsequently, an IDS detection system was created, which is able to detect the ongoing attack generated by the created generator. Its implementation was also described. The results show that Slow DoS attacks are able to prevent access to the target service faster and more effectively than conventional flood attacks. The detection system, on the other hand, is able to detect them.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.