Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(703.43KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
DoS Forensic Exemplar Comparison to a Known Sample
Paul Knight, Narasimha Karpoor Shashidhar
Pages - 11 - 21     |    Revised - 31-03-2018     |    Published - 30-04-2018
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 12   Issue - 1    |    Publication Date - April 2018  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Denial of Service Flow Comparison, DoS Similarity Score, DoS Exemplar, Stresser.
ABSTRACT
The investigation of any event or incident often involves the evaluation of physical evidence. Occasionally, a comparison is conducted between an evidentiary sample of unknown origin and that of an appropriate known sample. In a Denial of Service (DoS) attack, items of evidentiary value may cross the spectrum from anecdotes to useful information in firewall logs or complete packet captures. Because of the spoofed or reflective nature of DoS attacks, relevant information leading to the direct identification of the perpetrator is rarely available. In many instances, this underscores the significance of the investigator's ability to accurately identify the tool utilized by the suspect. For a DoS attack scenario, this would likely involve a commercially available stresser or criminal bot infrastructure. In this paper, we propose the concept of a DoS exemplar and determine if the comparison of evidentiary samples to an appropriate known sample of DoS attributes could add value in the investigative process. We also provide a simple tool to compare two DoS flows.
ABSTRACTING & INDEXING
1 Google Scholar 
2 BibSonomy 
3 Doc Player 
4 Scribd 
5 SlideShare 
REFERENCES
D. A. Wheeler, & G. N. Larsen (2003). "Techniques for cyber-attack attribution" (No. IDA-P-3792). Institute for Defense Analyses, Alexandria, VA.
GitHub - prknight/Sam_Project [Online]. Available: https://github.com/prknight/Sam_Project.
J. Hunker, M. Bishop, & C. Gates. (2010). "Report on Attribution for GENI". In National Science Foundation Project 1776, 2010.
J. Santanna, R. van Rijswijk-Deij, R. Hofstede, A. Sperotto, M. Wierbosch, L. Z. Granville, & A. Pras. (2015) "Booters-An analysis of DDoS-as-a-service attacks". In Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on (pp. 243-251). IEEE.
M. Karami, "Understanding and Undermining the Business of DDoS Booter Services," Ph.D. dissertation, Dept. Comp. Sci., George Mason Univ., Fairfax, VA, 2016.
M. Kührer, T. Hupperich, C. Rossow, & T. Holz. (2014, Aug). "Exit from Hell? Reducing the Impact of Amplification DDoS Attacks". In USENIX Security Symposium (pp. 111-125).
MANUSCRIPT AUTHORS
Professor Paul Knight
Department of Computer Science Sam Houston State University Huntsville, TX 77341, USA - United States of America
Dr. Narasimha Karpoor Shashidhar
Sam Houston State University - United States of America


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions