Research Article
Detect the Reflection Amplification Attack Based on UDP Protocol
@INPROCEEDINGS{10.4108/eai.15-8-2015.2260976, author={Chang Liu and Gang Xiong and Jie Liu and Gaopeng Gou}, title={Detect the Reflection Amplification Attack Based on UDP Protocol}, proceedings={10th EAI International Conference on Communications and Networking in China}, publisher={IEEE}, proceedings_a={CHINACOM}, year={2015}, month={9}, keywords={attack; reflection; amplification; detection}, doi={10.4108/eai.15-8-2015.2260976} }
- Chang Liu
Gang Xiong
Jie Liu
Gaopeng Gou
Year: 2015
Detect the Reflection Amplification Attack Based on UDP Protocol
CHINACOM
IEEE
DOI: 10.4108/eai.15-8-2015.2260976
Abstract
As the DDoS (Distributed Denial of Service) attack becomes more and more popular and the IDS evasion technology continuously renews, the security of the Internet attracts more attention of researchers and attackers. However, the evasion technology against IDS needs a lot of advanced work and has strict requirements for attackers. Thus, the attack to the IDS is paid more attention for attacking the targeted host easily. Among different attacks, DDoS attack implements relatively easily, and one typical popular attack frequently seen in large scale DDoS attacks is the reflection amplification attack with a little difference with the DRDOS (Distributed Reflection Denial of Service). To this end, we provide a detection method for this attack specially. And the result of the experiments shows the method is of great theoretical and practical value.