DOI QR코드

DOI QR Code

SYN Flood DoS Detection System Using Time Dependent Finite Automata

  • Noura AlDossary (Department of Computer Science (CS), College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University) ;
  • Sarah AlQahtani (Department of Computer Science (CS), College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University) ;
  • Reem Alzaher (Department of Computer Science (CS), College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University) ;
  • Atta-ur-Rahman (Department of Computer Science (CS), College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University)
  • Received : 2023.06.05
  • Published : 2023.06.30

Abstract

Network intrusion refers to any unauthorized penetration or activity on a computer network. This upsets the confidentiality, integrity, and availability of the network system. One of the major threats to any system's availability is a Denial-of-Service (DoS) attack, which is intended to deny a legitimate user access to resources. Therefore, due to the complexity of DoS attacks, it is increasingly important to abstract and describe these attacks in a way that will be effectively detected. The automaton theory is used in this paper to implement a SYN Flood detection system based on Time-Dependent Finite Automata (TDFA).

Keywords

References

  1. T. Penttinen, "Distributed Denial-of-Service Attacks in the Internet," 2005. 
  2. M. Bogdanoski, T. Shuminoski, and A. Risteski, "Analysis of the SYN Flood DoS Attack," Computer Network and Information Security, vol. 8, pp. 1-11, 2013, doi: 10.5815/ijcnis.2013.08.01. 
  3. R. Tandon, "A Survey of Distributed Denial of Service Attacks and Defenses," Aug. 2020, Accessed: May 18, 2022. [Online]. Available: http://arxiv.org/abs/2008.01345 
  4. J. W. Branch, "EXTENDED AUTOMATA-BASED APPROACHES TO INTRUSION DETECTION," 2003. 
  5. A. A. Sharipbay, Z. S. Saukhanova, G. B. Shakhmetova, and N. S. Saukhanov, "Application of finite automata in cryptography," Jun. 2019. doi: 10.1145/3330431.3330452. 
  6. Z. F. Han, J. P. Zou, H. Jin, Y. P. Yang, and J. H. Sun, "Intrusion detection using adaptive time-dependent finite automata," in Proceedings of 2004 International Conference on Machine Learning and Cybernetics, 2004, vol. 5, pp. 3040-3045. doi: 10.1109/icmlc.2004.1378554. 
  7. J. W. Branch, A. Bivens, C. Y. Chan, T. K. Lee, and B. K. Szymanski, "Denial of Service Intrusion Detection Using Time Dependent Deterministic Finite Automata," 2002. 
  8. P. M. Rathod, N. Marathe, and A. v. Vidhate, "A survey on Finite Automata based pattern matching techniques for network Intrusion Detection System (NIDS)," Jan. 2015. doi: 10.1109/ICAECC.2014.7002456. 
  9. X. Yu, W. C. Feng, D. Yao, and M. Becchi, "O3FA: A scalable finite automata-based pattern-matching engine for out-of-order deep packet inspection," in ANCS 2016 - Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems, Mar. 2016, pp. 1-11. doi: 10.1145/2881025.2881034. 
  10. Q. W. Shang, K. Cao, and F. Wang, "The study on network attacks based on automaton theory," in Procedia Engineering, 2011, vol. 23, pp. 653-658. doi: 10.1016/j.proeng.2011.11.2561. 
  11. N. David et al., "Modelling social-technical attacks with timed automata," in MIST 2015 - Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, co-located with CCS 2015, Oct. 2015, pp. 21-28. doi: 10.1145/2808783.2808787. 
  12. M. Almseidin, I. Piller, M. Al-Kasassbeh, and S. Kovacs, "Fuzzy automaton as a detection mechanism for the multistep attack," International Journal on Advanced Science, Engineering and Information Technology, vol. 9, no. 2, pp. 575-586, 2019, doi: 10.18517/ijaseit.9.2.7591. 
  13. G. Kim, "the Relationship Between the Chomsky Hierarchy and Automata," pp. 1-10, 2019. 
  14. P. Grachev, I. Lobanov, I. Smetannikov, and A. Filchenkov, "Neural network for synthesizing deterministic finite automata," Procedia Computer Science, vol. 119, pp. 73-82, 2017, doi: 10.1016/j.procs.2017.11.162. 
  15. K. M. Elleithy, D. Blagovic, W. K. Cheng, P. Sideleau, A. " Et, and W. Cheng, "Denial of Service Attack Techniques: Analysis, Implementation and Comparison," 2005. [Online]. Available: http://digitalcommons.sacredheart.edu/computersci_fac 
  16. F. H. Hsu, Y. L. Hwang, C. Y. Tsai, W. T. Cai, C. H. Lee, and K. W. Chang, "TRAP: A Three-way handshake server for TCP connection establishment," Applied Sciences (Switzerland), vol. 6, no. 11, Nov. 2016, doi: 10.3390/app6110358. 
  17. S. Deore and A. Patil, "Survey Denial of Service classification and attack with Protect Mechanism for TCP SYN Flooding Attacks Atul Patil," International Research Journal of Engineering and Technology, 2016, doi: 10.1109/TC.2003.1176986. 
  18. M. W. Jeter, Network Programming, vol. 1. 2018. doi: 10.1201/9780203749333-6. 
  19. "tcpdump(1) man page | TCPDUMP & LIBPCAP." https://www.tcpdump.org/manpages/tcpdump.1.html (accessed May 18, 2022). 
  20. Fahd Alhaidari, Nouran Abu Shaib, Maram Alsafi, Haneen Alharbi, Majd Alawami, Reem Aljindan, Atta-ur Rahman, Rachid Zagrouba, "ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques", Computational Intelligence and Neuroscience, vol. 2022, Article ID 1615528, 15 pages, 2022. https://doi.org/10.1155/2022/1615528. 
  21. M. Jamal, N.A. Zafar, A. Rahman, D. Musleh, M. Gollapalli, S. Chabani, "Modeling and Verification of Aircraft Takeoff Through Novel Quantum Nets," Computers, Materials and Continua, vol. 72, no. 2, pp. 3331-3348, 2022.  https://doi.org/10.32604/cmc.2022.025205
  22. A. Rahman, M. Mahmud, T. Iqbal, L. Saraireh, H. Kholidy et al., "Network Anomaly Detection in 5G Networks," Mathematical Modelling of Engineering Problems, vol. 9, No. 2, pp. 397-404, 2022.  https://doi.org/10.18280/mmep.090213
  23. F. Al-Jawad, R. Alessa, S. Alhammad, B. Ali, M. Al-Qanbar, A. Rahman, "Applications of 5G and 6G in Smart Health Services," International Journal of Computer Science and Network Security, vol. 22, no. 3, pp. 173-182, 2022. 
  24. S.U. Rehman, M. Mahmud, A. Rahman, I.U. Haq, M. Safdar, "Information Security in Business: A Bibliometric Analysis of the 100 Top Cited Articles," Library Philosophy and Practice (e-journal), 5354, 
  25. R. Zagrouba, A. AlAbdullatif, K. AlAjaji, N. Al-Serhani, F. Alhaidari, A. Almuhaideb, A. Rahman, "Authenblue: a new authentication protocol for the industrial internet of things," Computers, Materials & Continua, vol. 67, no.1, pp. 1103-1119, 
  26. A. Rahman, S. Dash, A.K. Luhach, N. Chilamkurti, S. Baek, Y. Nam, "A Neuro-Fuzzy Approach for User Behavior Classification and Prediction", Journal of Cloud Computing, 8(17), 2019. 
  27. A. Rahman, "Memetic Computing based Numerical Solution to Troesch Problem", Journal of Intelligent and Fuzzy Systems, 37(1):1545-1554, 2019.  https://doi.org/10.3233/JIFS-18579
  28. A. Rahman, "Optimum Information Embedding in Digital Watermarking", Journal of Intelligent and Fuzzy Systems, 37(1):553-564, 2019.  https://doi.org/10.3233/JIFS-162405
  29. A. Rahman, S. Abbas, M. Gollapalli, R. Ahmed, S. Aftab et al., "Rainfall Prediction System Using Machine Learning Fusion for Smart Cities," Sensors, vol. 22, no. 9, pp. 1-15, 2022. https://doi.org/10.3390/s22093504. 
  30. N. M. Ibrahim, D. G. I. Gabr, A. Rahman, S. Dash, A. Nayyar, "A deep learning approach to intelligent fruit identification and family classification," Multimedia Tools and Applications, 2022. https://doi.org/10.1007/s11042-022-12942-9. 
  31. M Gollapalli, A. Rahman, D. Musleh, N. Ibrahim et al., "A Neuro-Fuzzy Approach to Road Traffic Congestion Prediction," Computers, Materials and Continua, vol. 72, no. 3, pp. 295-310, 2022.  https://doi.org/10.32604/cmc.2022.027925
  32. A. Rahman, K. Sultan, I. Naseer, R. Majeed, D. Musleh et.al., "Supervised Machine Learning-based Prediction of COVID19," Computers, Materials & Continua, vol. 69, no.1, pp. 21- 34, 2021. DOI: 10.32604/cmc.2021.013453. 
  33. S. M. Alotaibi, A. Rahman, M. I. Basheer and M. A. Khan, "Ensemble machine learning based identification of pediatric epilepsy," Computers, Materials & Continua, vol. 68, no.1, pp. 149-165, 
  34. G. Zaman, H. Mahdin, K. Hussain, A. Rahman, J. Abawajy and S. A. Mostafa, "An Ontological Framework for Information Extraction from Diverse Scientific Sources," IEEE Access, vol. 9, pp. 42111-42124, 2021. doi: 10.1109/ACCESS.2021.3063181. 
  35. A. Rahman, S. Dash, M. Ahmad, T. Iqbal, "Mobile Cloud Computing: A Green Perspective," Intelligent Systems, Lecture Notes in Networks and Systems book series (LNNS, volume 185), pp. 523-533, 
  36. A. Rahman, "GRBF-NN based ambient aware realtime adaptive communication in DVB-S2." J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-02174-w. 
  37. F. Alhaidari, A. Rahman, & R. Zagrouba, "Cloud of Things: architecture, applications and challenges." J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-02448-3. 
  38. A. Rahman, S. Dash, & A.K. Luhach, "Dynamic MODCOD and power allocation in DVB-S2: a hybrid intelligent approach." Telecommun Syst, vol. 76, pp. 49-61, 2021. https://doi.org/10.1007/s11235-020-00700-x. 
  39. M. Ahmad, M.A. Qadir, A. Rahman et al., "Enhanced query processing over semantic cache for cloud based relational databases." J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-01943-x 
  40. M. Mahmud, A. Rahman, M. Lee, J. Choi, "Evolutionary-based image encryption using RNA codons truth table", Optics & Laser Technology, vol. 121:1-8, 2020. 
  41. G. Zaman, H. Mahdin, K. Hussain, A. Rahman, N. Ibrahim, N.Z.M. Safar, "Digital Library of Online PDF Sources: An ETL Approach," IJCSNS, vol. 20 (11), pp. 172-181, 2020. 
  42. M. Ahmad, U. Farooq, A. Rahman, A. Alqatari, S. Dash & A.K. Luhach, "Investigating TYPE constraint for frequent pattern mining", Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 605-626, 2019.  https://doi.org/10.1080/09720529.2019.1637158
  43. K. Sultan, I.M. Qureshi, A. Rahman, B.A. Zafar, M. Zaheer, "CSI Based Multiple Relay Selection and Transmit Power Saving Scheme for Underlay CRNs Using FRBS and Swarm Intelligence," International Journal of Applied Metaheuristic Computing (IJAMC) 10 (3), 1-18, 2019.  https://doi.org/10.4018/IJAMC.2019070101
  44. A. Rahman, M.I.B. Ahmed, "Virtual Clinic: A CDSS Assisted Telemedicine Framework", Chapter 15, Telemedicine Technologies, 1st Edition. Elsevier, 2019. 
  45. L. Ajmi, Hadeel, N. Alqahtani, A. Rahman and M. Mahmud, "A Novel Cybersecurity Framework for Countermeasure of SME's in Saudi Arabia," 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), 2019, pp. 1-9, doi: 10.1109/CAIS.2019.8769470. 
  46. A. Rahman, Maqsood Mahmud, Kiran Sultan, Nahier Aldhafferi, Abdullah Alqahtani, Dhiaa Abdullah, "Medical Image Watermarking for Fragility and Robustness: A Chaos, ECC and RRNS Based Approach", Journal of Medical Imaging and Health Informatics, vol. 8(6), pp. 1192-1200, July 2018.  https://doi.org/10.1166/jmihi.2018.2431
  47. A. Rahman, "Efficient Decision Based Spectrum Mobility Scheme for Cognitive Radio Based V2V Communication System," Journal of Communications, vol. 13, no. 9, pp. 498- 504, 2018. Doi: 10.12720/jcm.13.9.498-504. 
  48. A. Rahman, F.A. Alhaidari, "Querying RDF Data", Journal of Theoretical and Applied Information Technology 26(22):7599-7614, 2018. 
  49. M.Z. Muzaffar, I.M. Qureshi, A. Rahman, F.A. Alhaidari, M.A.A. Khan, "Compressed Sensing for Security and Payload Enhancement in Digital Audio Steganography", Journal of Information Hiding and Multimedia Signal Processing, 15(6):1506-1517, Nov. 2018. 
  50. A. Rahman, S.A. Alrashed, A. Abraham, "User Behavior Classification and Prediction using FRBS and Linear Regression" Journal of Information Assurance and Security, vol. 12, no. 3, pp. 86-93, 2017.