COMPUTER NETWORK ATTACK
PROCEDURES, THEIR MITIGATION
MEASURES AND THE DEVELOPMENT
OF AN IMPROVED DENIAL OF
SERVICE (DoS) ATTACK MODEL
IHEKWEABA OGECHI, INYIAMA H.C, IHEKWEABA CHUKWUGOZIEM
ABSTRACT - This paper presents the major network attack profiles, taxonomies, classification and identification frameworks.
Further, current approaches for intrusion detection on networks were x-rayed though, with emphasis on
Denial of Service (DoS) attacks only.
The concept of intelligent agents and subsequently adaptive systems was elucidated, the properties derived were used as a proof of concept, and then applied in the development of a model for an adaptive intelligent multi-agent for network protection, against denial of service attacks.
KEYWORDS: Agent, Denial of Service attack, Dynamic Host Configuration Protocol, Transmission
Control Protocol, / Internet Protocol
1.0 INTRODUCTION
As the world has moved further into information – driven global economy, the value of information, and controlled access to that information, has never been greater [1]. The goal of IT infrastructure therefore is to create systems that can detect and protect against unauthorized access while providing timely access to legitimate users. Today’s network must be able to respond to attacks in ways that maintain network availability and reliability and allow a business to continue to function. In many respects, the goal of security is to make networks more resilient by making them more flexible. Rather than succumb, networks must be able to absorb attacks and remain operational, much in the same way the human immune system allows us to keep functioning in the presence of viruses and related bacterial infections.
The future of security technology has changed more in the last three years than it did in the prior ten years [2].
The extent of these changes, as well as the rate of changes, has made it difficult for security IT departments to keep up with
References: [3] Todd Lammle, “ Cisco Certified Network Associate Study Guide Sixth Edition”. Chapter 10 page 611 -613, 2007. [13] Genge Box, Gwilyn Jenkins, and Gregory Reinsel, “Time series analysis forecasting and control”. Prentice-Hall, New york, NY, 1986. [14] Ronald Bracewell, “The Fourier Transform and Its Applications”. Series in electrical engineering. Mc Graw Hill. New York NY, 1986 [15] H. Debar, M. Becker, and D. Sibon, “A neural network component for an intrusion detection system”. In proceeding of the IEEE computer society symposium on research in Security and privacy, 1992. [16] S. Kumar and E.H. Spafford, “An application of pattern matching in intrusion detection”. In technical report CSDTR-94-013, Purdue university, 1994. [17] K. Ghosh, “Learning program behaviour profiles for intrusion detection”. In proceedings of the 1st USENIX workshop on intrusion detection and network monitoring, 1991. [20] R. Agrawal, T. Imielinski, and A. Swami, “Mining association rules between set of items in large database”. In proceeding of the 1993 international conference on management of Data (SIGMOD93), ACM press, vol(22) issue 2, 1993, page 207-216. [21] W. Lee, and S. Stolfo “Data mining approaches for intrusion detection”. In proceeding of the 7th USENIX security symposium, 1998. [23] http://www.sans.org/resources/idfaq/hostbase.php.online article (last accessed: July 06 2006). [31] R. Oliveira, “Network management with knowledge of Requirement: Use of software Agents”. PhD thesis, 1998. [32] M. Wooldridge and N. R. Jennirys “Intelligent Agents: Theory and practice”. Knowledge Engineering Review, 1995. [34] J. P.Muller,” The Design of intelligent Agents- A layered approach”. LNA1 state-of-the art survey, springer, Berlin, Germany, 1996. [35] M. Asaka, S. Okasa wa, A. Taguchi, and S. “ A method of tracing intruders by use of mobile agents”. In INET’99, 1999. [37] M.C. Bernades and E. Dos Santos Mareira. Implementation of an intrusion detection system based in mobile agents. In international symposium on software engineering for parallel and distributed system, 2000. Technical report, university of Minnesota, 2002. [40] A.Rao and M.Geogeff, “BDI agent: from theory of practice technical note, 1991. [44] Neil’s Ferguson, Bruce Schenier, “Practice cryptogram”, Wiley publishing, Inc. 2003. [48] Ari Juels and John Brainerd, “Client puzzle: Cryptographic defense against connection depletion attacks”. In S.Kent, editor, proceedings of NDSS, as, 1999. [52] Jocobson, I, Booch, G. and J. Rumbanyh, “The Unified Software Development Process, Addison –Wesley, 1999.