Доступ предоставлен для: Guest
Journal of Automation and Information Sciences

Выходит 12 номеров в год

ISSN Печать: 1064-2315

ISSN Онлайн: 2163-9337

SJR: 0.173 SNIP: 0.588 CiteScore™:: 2

Indexed in

Web-Based Three-Layer Protection Mechanism Against Distributed Denial of Service

Том 51, Выпуск 9, 2019, pp. 24-31
DOI: 10.1615/JAutomatInfScien.v51.i9.30
Get accessGet access

Краткое описание

It is widely recognized that the distributed denial of service (DDoS) attacks can disrupt web services and lead to large revenue losses. DDoS attacks restrict and block legitimate users accessing web-servers by the exhaustion of victim's resources. Due to system leaks and a hidden security problem used, this attack has the characteristics of natural behavior and it is difficult to block it. Protection of web services is of paramount importance since the Internet is the main technology underlying e-commerce, this is the main purpose of DDoS attacks. The article proposed to isolate and protect the correct traffic from the huge volumes of DDoS traffic when an attack occurs. A new DDoS security mechanism has been developed, which is a three-layer protection mechanism based on web-servers. Combining the characteristics of web server traffic and aiming at TCP/IP reference model, it uses statistical filtering and traffic restriction in the network layer, transport layer and application layer to filter out illegal traffic to ensure normal traffic passage. Most of the illegitimate traffic is filtered by SHCF (Simplified Filtering of Hopes) algorithm at the network level. The rest of the illegal traffic is filtered according to the SYNProxyFirewall algorithm at the transmission level. Traffic restriction is used at the application level while DDoS attacks use a legitimate IP address. Due to the joint protection of the three-layer mechanism, support for the availability of web services can be provided during DDoS attacks. The protection mechanism is implemented and tested inside the Linux kernel. The result shows that a three-layer protection mechanism can effectively protect against DDoS attacks

ЛИТЕРАТУРА
  1. Kerimov K.F., Threat identification model of information security in electronic resources. Prospects for the development of engineering and technology and achievements of the mining and metallurgical industry over the years of independence of the Republic of Uzbekistan, Abstracts of Conference, May 12-14, 2011, Navoi, 2011, 339-340. .

  2. KozlovD.D., Petukhov A.A., Methods for detecting vulnerabilities in web applications, Programmnyye sistemy i instrumenty, 2006, No. 7, 156-166. .

  3. Kerimov K.F., Mukhsinov Sh.Sh., Ismatullayev S.O., Firewall of databases based on anomaly detection, Problemy informatiki i energetiki, 2015, 3-4. .

  4. Nizamutdinov M.K., IT-applications defense and attack tactics, BHW-Petersburg, Saint-Petersburg, 2005, 10-30. .

  5. Pazizin S.V., Fundamentals of information protection in computer systems [in Russian], TVP-Opi-PM, Moscow, 2003. .

  6. Petrenko S.A., Petrenko A.A., Intranet security audit [in Russian], DMK Press, Moscow, 2002. .

  7. Rzhavskiy K.V., Information security: practical protection of information technologies and telecommunication systems [in Russian], VolGU, Volgograd, 2002. .

  8. KhorevP.B., Methods and means of information protection in computer systems [in Russian], Gelios, Moscow, 2006. .

  9. Opanasenko V.N., Kryvyi S.L., Synthesis of adaptive logical networks on the basis of Zhegalkin polynomials, Cybernetics and Systems Analysis, 2015, 51, No. 6, 969-977, DOI: 10.1007/s-10559-015-9790-1. .

Портал Begell Электронная Бибилиотека e-Книги Журналы Справочники и Сборники статей Коллекции Цены и условия подписки Begell House Контакты Language English 中文 Русский Português German French Spain