Distributed Denial of Service Attacks Analysis, Detection, and Mitigation for the Space Control Ground Network
DDoS attacks analysis, detection and mitigation
Keywords:
Mission control center (MCC), Distributed Denial of Service (DDoS), TCP flood, DDoS detection, DDoS MitigationAbstract
After launching any satellite, it must be controlled from the ground by the mission control center (MCC) by receiving the health state telemetry and issuing telecommand to control it or to execute its mission so, the network of MCC should be kept safe from any kind of malicious attacks such as Distributed Denial of Service (DDoS). The DDoS attacks could be launched or deployed either by external or internal attackers. DDoS can be defined generally as follow: it is an attempt to exhaust target server resources or consume the available bandwidth to make the target server unavailable to the normal clients. MCC network was simulated using virtual machines – 8 virtual machines. More than 5 types of DDoS tried to attack the simulated MCC network but 2 types were chosen – HTTP and TCP flood- to be designed because of its effectiveness. The analysis was done before and after the attacks by analyzing the captured traffic by Wireshark software. According to the deep analysis results, the detection algorithm was designed to detect the applied attacks. Now the attacker machines are known, so mitigation of theses attacked machines was done by adding blocking rules in the windows firewall automatically. Mitigation was done simply and in a straightforward
way but with some instability. Consequently, a new mitigation technique will be developed to block DDoS attacks.
References
. Data Flow Architecture, and Methodologies for a Newly Researched Comprehensive Hybrid Model
for the Detection of DDoS Attacks on Cloud Computing Environment, Information Technology: New Generations, Springer, 377-387 (2016).
D. Gillman, Y. Lin, B. Maggs, and R.K.Sitaraman, Protecting websites from attack with secure delivery networks, IEEE. 48: 26-34 (2015).
N. Hoque, D. K. Bhattacharyya, J.K.Kalita. Botnet in DDoS attacks: trends and challenges, IEEE Communications Surveys & Tutorials 17: 2242-2270 (2015).
C. Wang., T.T.N. Miu., X. Luo, J. Wang. SkyShield: A sketch-based defense system against applicationlayer DDoS attacks, IEEE Transactions on Information Forensics and Security. 13(3)559-573 (2018).
S. Acharya, and N.Tiwari, Survey of DDoS attacks based on TCP/IP protocol vulnerabilities, IOSR Journal of Computer Engineering (IOSR-JCE)18(3) 68-76 (2016).
C.Rocky and Chang, Defending against floodingbased distributed denial-of-service attacks: a tutorial, IEEE communications magazine, 42-51, 40 (2002).
P. Kamboj, M. C. Trivedi, V. K. Yadav, and V. K.Singh, Detection techniques of DDoS attacks: A survey, 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON), IEEE, pp. 675-679(2017).
A. Yusof, A. Riza'ain, N.L Udzir, and A. Selamat,Systematic literature review and taxonomy for DDoS attack detection and prediction, International Journal of Digital Enterprise Technology, pp. 292-315, 1(2019).
Y-J. Lee, N-K. Baik, C. Kim, and C-N. Yang, Study of detection method for spoofed IP against DDoS attacks, Personal and Ubiquitous Computing, pp.35-44, 22 (2018).
S. T. Zargar., J. Joshi, and D. Tipper. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks, IEEE
Communications Surveys & Tutorials. 15: 2046-2069 (2013).
A. Stavrou., D. Fleck, and C. Kolias, On the Move: Evading Distributed Denial-of-Service Attacks, IEEE Annals of the History of Computing, 49: 104-107 (2016).
A. SahI, D. Lai, Y. Li and M. Diykh, An efficient DDoS TCP flood attack detection and prevention system in a cloud environment, IEEE Access 5-2017, pp. 6036-6048, 5 (2017).
F. Yihunie, E. Abdelfattah, and A. Odeh, Analysis of ping of death DoS and DDoS attacks, 2018 IEEE Long Island Systems, Applications, and Technology Conference (LISAT), IEEE, pp. 1-4 (2018).
V. Kansal and M. Dave, Proactive DDoS attack detection and isolation, 2017 International Conference on Computer, Communications, and Electronics (Comptelix), IEEE, pp. 334-338 (2017).
B. Zhang, T. Zhang and Z. Yu, DDoS detection and prevention based on artificial intelligence techniques, 2017 3rd IEEE International Conference on Computer and Communications (ICCC), IEEE, pp. 1276-1280 (2017).
I. Ghafir and V. Prenosil, Blacklist-based malicious IP traffic detection, 2015 Global Conference on Communication Technologies (GCCT), IEEE, pp.229-233 (2015).
M. Yusof, M.A. Mohd, M.Y. Draus and F.Ali,Detection and defense algorithms of different types of DDoS attacks, International Journal of Engineering and Technology 9, pp. 410, 9 (2017).
A. Praseed, Amet, and P.Thilagam, DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications, IEEE Communications Surveys & Tutorials 21, pp. 661-685, 21 (2019).
E. Özer and M. İskefiyeli, Detection of DDoS attack via deep packet analysis in real-time systems, 2017 International Conference on Computer Science and Engineering (UBMK), IEEE, pp. 1137-1140 (2017).