Suscripción a Biblioteca: Guest
Journal of Automation and Information Sciences

Publicado 12 números por año

ISSN Imprimir: 1064-2315

ISSN En Línea: 2163-9337

SJR: 0.173 SNIP: 0.588 CiteScore™:: 2

Indexed in

Web-Based Three-Layer Protection Mechanism Against Distributed Denial of Service

Volumen 51, Edición 9, 2019, pp. 24-31
DOI: 10.1615/JAutomatInfScien.v51.i9.30
Get accessGet access

SINOPSIS

It is widely recognized that the distributed denial of service (DDoS) attacks can disrupt web services and lead to large revenue losses. DDoS attacks restrict and block legitimate users accessing web-servers by the exhaustion of victim's resources. Due to system leaks and a hidden security problem used, this attack has the characteristics of natural behavior and it is difficult to block it. Protection of web services is of paramount importance since the Internet is the main technology underlying e-commerce, this is the main purpose of DDoS attacks. The article proposed to isolate and protect the correct traffic from the huge volumes of DDoS traffic when an attack occurs. A new DDoS security mechanism has been developed, which is a three-layer protection mechanism based on web-servers. Combining the characteristics of web server traffic and aiming at TCP/IP reference model, it uses statistical filtering and traffic restriction in the network layer, transport layer and application layer to filter out illegal traffic to ensure normal traffic passage. Most of the illegitimate traffic is filtered by SHCF (Simplified Filtering of Hopes) algorithm at the network level. The rest of the illegal traffic is filtered according to the SYNProxyFirewall algorithm at the transmission level. Traffic restriction is used at the application level while DDoS attacks use a legitimate IP address. Due to the joint protection of the three-layer mechanism, support for the availability of web services can be provided during DDoS attacks. The protection mechanism is implemented and tested inside the Linux kernel. The result shows that a three-layer protection mechanism can effectively protect against DDoS attacks

REFERENCIAS
  1. Kerimov K.F., Threat identification model of information security in electronic resources. Prospects for the development of engineering and technology and achievements of the mining and metallurgical industry over the years of independence of the Republic of Uzbekistan, Abstracts of Conference, May 12-14, 2011, Navoi, 2011, 339-340. .

  2. KozlovD.D., Petukhov A.A., Methods for detecting vulnerabilities in web applications, Programmnyye sistemy i instrumenty, 2006, No. 7, 156-166. .

  3. Kerimov K.F., Mukhsinov Sh.Sh., Ismatullayev S.O., Firewall of databases based on anomaly detection, Problemy informatiki i energetiki, 2015, 3-4. .

  4. Nizamutdinov M.K., IT-applications defense and attack tactics, BHW-Petersburg, Saint-Petersburg, 2005, 10-30. .

  5. Pazizin S.V., Fundamentals of information protection in computer systems [in Russian], TVP-Opi-PM, Moscow, 2003. .

  6. Petrenko S.A., Petrenko A.A., Intranet security audit [in Russian], DMK Press, Moscow, 2002. .

  7. Rzhavskiy K.V., Information security: practical protection of information technologies and telecommunication systems [in Russian], VolGU, Volgograd, 2002. .

  8. KhorevP.B., Methods and means of information protection in computer systems [in Russian], Gelios, Moscow, 2006. .

  9. Opanasenko V.N., Kryvyi S.L., Synthesis of adaptive logical networks on the basis of Zhegalkin polynomials, Cybernetics and Systems Analysis, 2015, 51, No. 6, 969-977, DOI: 10.1007/s-10559-015-9790-1. .

Portal Digitalde Biblioteca Digital eLibros Revistas Referencias y Libros de Ponencias Colecciones Precios y Políticas de Suscripcione Begell House Contáctenos Language English 中文 Русский Português German French Spain