Abstract
This article presents the potential use of implementation fuzzy observance for discovering and protecting network from suffering of Distributed Denial of Service attacks. DDoS attack are able to block web servers and could be started from any place in the network. In this article some real experimental results are presented. Prepared network and DDoS attack tool was used for collecting IP packets during attack, then some extension to fuzzy logic was implemented and used for discovering attack. As a results, the authors present a problem and tool which implemented in IP network could deal with DDoS attack using fuzzy logic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cert advisory ca-1996-01 UDP port denial-of-service attack, September 1997. http://www.cert.org/advisories/ca-1996-01.html
Cert advisory ca-1996-21 tcp syn flooding and ip spoofing attacks, November 2000. http://www.cert.org/advisories/ca-1996-21.html
http://resources.infosecinstitute.com/dos-attacks-free-dos-attacking-tools/
http://www.ll.mit.edu/mission/communications/cyber/cstcorpora/ideval/data/
Wireshark database from test. http://airlab.ukw.edu.pl/index.php/pl/zbiory-danych2/server-srv-works-on-ip-192-168-10-12
Zadeh, L.A.: Fuzzy sets. Inf. control 8(3), 338â353 (1965)
Angryk, R., Czerniak, J.: Heuristic algorithm for interpretation of multi-valued attributes in similarity-based fuzzy relational databases. Int. J. Approximate Reasoning 51(8), 895â911 (2010)
Apiecionek, Ć., Czerniak, J., Zarzycki, H.: Protection tool for distributed denial of ser-vices attack. In: Communications in Computer and Information Science, vol. 424, pp. 405â414. Springer (2014)
Apiecionek, Ć., Czerniak, J.: Qos solution for network resource protection. In: Proceedings of International Scientific Conference INFORMATICS 2013, Spisk Nov Ves, Slovakia, 5â7 November 2013
Apiecionek, Ć., Czerniak, J., Dobrosielski, W.: Quality of services method as a ddos protection tool. In: Advances in Intelligent Systems and Computing, pp. 225â234. Springer (2015)
Apiecionek, L., Romantowski, M.: Secure IP network model. Comput. Method Sci. Technol. 19(4), 209â213 (2013)
Apiecionek, Ć., Czerniak, J.M., Zarzycki, H.: Protection tool for distributed denial of services attack. In: Beyond Databases, Architectures and Structures, BDAS 2014, vol. 424, pp. 405â414 (2014)
Chapman, B., Zwicky, E.: Building Internet Firewalls. OâReilly & Associates, Inc. (1995)
Cheswick, W., Bellovin, S.: Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Publishing Company, Boston (1994)
Czerniak, J., Ewald, D., Macko, M., Smigielski, G., Tyszczuk, K.: Approach to the monitoring of energy consumption in eco-grinder based on abc optimization. In: Beyond Databases, Architectures and Structures, BDAS 2015, vol. 521, pp. 516â529 (2015)
Czerniak, J., Zarzycki, H.: Application of rough sets in the presumptive diagnosis of urinary system diseases. Artif. Intell. Secur. Comput. Syst. 752, 41â51 (2003)
Czerniak, J.: Evolutionary approach to data discretization for rough sets theory. Fundam. Inf. 92(1â2), 43â61 (2009)
Czerniak, J.M., Dobrosielski, W.T., Apiecionek, Ć., Ewald, D., Paprzycki, M.: Practical Application of OFN Arithmetics in a Crisis Control Center Monitoring, pp. 51â64. Springer International Publishing, Cham (2016). http://dx.doi.org/10.1007/978-_3-_319-_40132-_4_4
Czerniak, J.M., Ewald, D.: A New MGlaber Approach as an Example of Novel Artificial Acari Optimization, pp. 545â557. Springer International Publishing, Cham (2016). http://dx.doi.org/10.1007/978-3-319-34099-9_42
Czerniak, J.M., Ewald, D., Ćmigielski, G., Dobrosielski, W.T., Apiecionek, Ć.: Optimization of Fuel Consumption in Firefighting Water Capsule Flights of a Helicopter, pp. 39â49. Springer International Publishing, Cham (2016). http://dx.doi.org/10.1007/978-3-319-40132-4_3
Czerniak, J., Apiecionek, L., Zarzycki, H.: Application of ordered fuzzy numbers in a new ofnant algorithm based on ant colony optimization. In: Communications in Computer and Information Science, vol. 424, pp. 259â270. Springer (2014)
Czerniak, J., Apiecionek, Ć., Zarzycki, H., Ewald, D.: Proposed CAEva simulation method for evacuation of people from a buildings on fire. Adv. Intell. Syst. Comput. 401, 315â326 (2016)
Czerniak, J., Dobrosielski, W., Apiecionek, Ć.: Representation of a trend in OFN during fuzzy observance of the water level from the crisis control center. In: Proceedings of the Federated Conference on Computer Science and Information Systems, ACSIS. vol. 5, pp. 443â447. IEEE Digital Library (2015)
Czerniak, J., Dobrosielski, W., Zarzycki, H., Apiecionek, Ć.: A proposal of the new owlant method for determining the distance between terms in ontology. In: Advances in Intel-ligent Systems and Computing, pp. 235â246. Springer (2015)
Czerniak, J., Macko, M., Ewald, D.: The cutMAG as a new hybrid method for multi-edge grinder design optimization. Adv. Intell. Syst. Comput. 401, 327â337 (2016)
Czerniak, J., Smigielski, G., Ewald, D., Paprzycki, M.: New proposed implementation of abc method to optimization of water capsule flight. In: Proceedings of the Federated Conference on Computer Science and Information Systems, ACSIS, vol. 5, pp. 489â493. IEEE Digital Librar (2015)
Dickerson, J.E., Dickerson, J.A.: Fuzzy network profiling for intrusion detection. In: Fuzzy Information Processing Society, 19th International Conference of the North American, 2000 NAFIPS, pp. 301â306. IEEE (2000)
Dickerson, J.E., Juslin, J., Koukousoula, O., Dickerson, J.A.: Fuzzy intrusion detection. In: Joint 9th IFSA World Congress And 20th NAFIPS International Conference 2001, vol. 3, pp. 1506â1510. IEEE. July 2001
Dubois, D., Prade, H.: Operations on fuzzy numbers. Int. J. Syst. Sci. 9, 613â626 (1978)
MikoĆajewska, E., MikoĆajewski, D.: E-learning in the education of people with disabilities. Adv. Clin. Exp. Med. 20(1), 103â109 (2011)
Ewald, D., Czerniak, J., Zarzycki, H.: Approach to solve a criteria problem of the ABC algorithm used to the WBDP multicriteria optimization. In: Advances in Intelligent Systems and Computing, pp. 129â130. Springer (2015)
Czerniak, J.: Evolutionary approach to data discretization for rough sets theory. Fundamenta Informaticae 92(1â2), 43â61 (2009)
Ukasiewicz, J.: O logice trjwartociowej. ruch filozoficzny, vol. 5, pp. 170â171 (1920). English translation: On three-valued logic. In: Borkowski, l. (ed.) selected works by Jan Ukasiewicz, Northholland, Amsterdam, p. 8788 (1970). (in polish)
KosiĆski, W., Prokopowicz, P., Ćlzak, D.: On algebraic oprerations on fuzzy numbers. In: Inteligent Information Processing and Web Mining: Proceedings of the International IIS:IIPWM03 Conference, Zakopane, Poland, 2â5 June 2003
KosiĆski, W., SĆysz, P.: Fuzzy numbers and their quotient space with algebraic operations. Bull. Pol. Acad. Sci. Ser. Tech. Sci. 41, 285â295 (1993)
Kovac, D., et al.: Modern internet based production technology. In: Meng J.E. (ed.) New Trends in Technologies: Devices, Computer, Communication and Industrial Systems, pp. 145â164. SCIYO (2010)
Prokopowicz, P.: Flexible and simple methods of calculations on fuzzy numbers with the ordered fuzzy numbers model. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) Proceedings of ICAISC 2013, part I. LNCS (LNAI), vol. 7894, pp. 365â375. Springer, Heidelberg (2013)
Piechowiak, M., Zwierzykowski, P.: The evaluation of multicast routing algorithms with delay constraints in mesh networks. In: 8th IEEE, IET International Symposium on Communication Systems, Networks and Digital Signal Processing CSNSDP 2012, Pozna, Poland (2012)
Piechowiak, M., Zwierzykowski, P.: The evaluation of unconstrained multicast routing algorithms in ad-hoc networks. In: The International Science Conference: Computer Net-works CN2012, Szczyrk, Poland (2012)
Prokopowicz, P., Malek, S.: Aggregation operator for ordered fuzzy numbers con-cerning the direction. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) Proceedings of ICAISC 2014, Part I, LNCS (LNAI), vol. 8467, pp. 267â278. Springer International Publishing, Switzerland (2014)
Rocky, K., Chang, C.: Defending against flooding-based distributed denial-of-service attacks. A Tutorial IEEE Commun. Mag. 40(10), 42â51 (2002)
Schuba, C.L., Krsul, I., Huhn, M.G., Spafford, E.H., Sundaram, A.: Analysis of a denial of service attack on TCP. Computer Science Technical reports, paper 1327 (1996). http://docs.lib.purdue.edu/cstech/1327
Thatte, G., Mitra, U., Heidemann, J.: Detection of low-rate attacks in computer networks. In: INFOCOM Workshops 2008, pp. 1â6. IEEE (2008)
Vokorokos, L., Ennert, M., Hartinger, M., Raduovsk, J.: A survey of parallel intrusion detection on graphical processors. In: Proceedings of International Scientific Conference INFORMATICS 2013, Spisk Nov Ves, Slovakia, 5â7 November 2013
KosiĆski, W.: On fuzzy number calculus. Int. J. Appl. Math. Comput. Sci. 16(1), 51â57 (2006)
Wierczewski, L.: Intel manycore testing lab - hardware and software environment focused on didactic of development and efficiency testing in software paralleling, Scientific Bulletin of Wroclaw School of Information Technology 2003, Wroclaw (2013). (in polish)
Wrzesie, M., Olejnik, Ć., Ryszawa, R.: Ids/ips: Detection and prevention systems of hacking the computer networks. Stud. Mater. Appl. Comput. Sci. 4(7), 16â21 (2012). (in polish)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Apiecionek, Ć., Czerniak, J.M., Dobrosielski, W.T., Ewald, D. (2018). New Proposal of Fuzzy Observation of DDoS Attack. In: Atanassov, K., et al. Uncertainty and Imprecision in Decision Making and Decision Support: Cross-Fertilization, New Models and Applications. IWIFSGN 2016. Advances in Intelligent Systems and Computing, vol 559. Springer, Cham. https://doi.org/10.1007/978-3-319-65545-1_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-65545-1_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65544-4
Online ISBN: 978-3-319-65545-1
eBook Packages: EngineeringEngineering (R0)