The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] DoS(76hit)

1-20hit(76hit)

  • Joint Selfattention-SVM DDoS Attack Detection and Defense Mechanism Based on Self-Attention Mechanism and SVM Classification for SDN Networks Open Access

    Wanying MAN  Guiqin YANG  Shurui FENG  

     
    PAPER-Human Communications

      Pubricized:
    2023/09/05
      Vol:
    E107-A No:6
      Page(s):
    881-889

    Software Defined Networking (SDN), a new network architecture, allows for centralized network management by separating the control plane from the forwarding plane. Because forwarding and control is separated, distributed denial of service (DDoS) assaults provide a greater threat to SDN networks. To address the problem, this paper uses a joint high-precision attack detection combining self-attentive mechanism and support vector machine: a trigger mechanism deployed at both control and data layers is proposed to trigger the initial detection of DDoS attacks; the data in the network under attack is screened in detail using a combination of self-attentive mechanism and support vector machine; the control plane is proposed to initiate attack defense using the OpenFlow protocol features to issue flow tables for accurate classification results. The experimental results show that the trigger mechanism can react to the attack in time with less than 20% load, and the accurate detection mechanism is better than the existing inspection and testing methods, with a precision rate of 98.95% and a false alarm rate of only 1.04%. At the same time, the defense strategy can achieve timely recovery of network characteristics.

  • Position Estimation for the Capsule Endoscope Using High-Definition Numerical Human Body Model and Measurement Open Access

    Akihiro YOSHITAKE  Masaharu TAKAHASHI  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2022/01/11
      Vol:
    E105-B No:7
      Page(s):
    848-855

    Currently, wireless power transmission technology is being developed for capsule endoscopes. By removing the battery, the capsule endoscope is miniaturized, the number of images that can be taken increases, and the risk of harmful substances leaking from the battery when it is damaged inside the body is avoided. Furthermore, diagnostic accuracy is improved by adjusting the directivity of radio waves according to the position of the capsule endoscope to improve efficiency and adjusting the number of images to be taken according to position by real-time position estimation. In this study, we report the result of position estimation in a high-definition numerical human body model and in an experiment on an electromagnetic phantom.

  • Image Quality Improvement for Capsule Endoscopy Based on Compressed Sensing with K-SVD Dictionary Learning

    Yuuki HARADA  Daisuke KANEMOTO  Takahiro INOUE  Osamu MAIDA  Tetsuya HIROSE  

     
    LETTER-Image

      Pubricized:
    2021/10/01
      Vol:
    E105-A No:4
      Page(s):
    743-747

    Reducing the power consumption of capsule endoscopy is essential for its further development. We introduce K-SVD dictionary learning to design a dictionary for sparse coding, and improve reconstruction accuracy of capsule endoscopic images captured using compressed sensing. At a compression ratio of 20%, the proposed method improves image quality by approximately 4.4 dB for the peak signal-to-noise ratio.

  • Specific Absorption Rate (SAR) Calculations in the Abdomen of the Human Body Caused by Smartphone at Various Tilt Angles: A Consideration of the 1950MHz Band

    Chiaki TAKASAKA  Kazuyuki SAITO  Masaharu TAKAHASHI  Tomoaki NAGAOKA  Kanako WAKE  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Pubricized:
    2021/09/01
      Vol:
    E105-B No:3
      Page(s):
    295-301

    Various electromagnetic (EM) wave applications have become commonplace, and humans are frequently exposed to EM waves. Therefore, the effect of EM waves on the human body should be evaluated. In this study, we focused on the specific absorption rate (SAR) due to the EM waves emitted from smartphones, developed high-resolution numerical smartphone models, and studied the SAR variation by changing the position and tilt angle (the angle between the display of the smartphone model and horizontal plane) of the smartphone models vis-à-vis the human abdomen, assuming the use of the smartphone at various tilt angles in front of the abdomen. The calculations showed that the surface shape of the human model influenced the SAR variation.

  • Research on DoS Attacks Intrusion Detection Model Based on Multi-Dimensional Space Feature Vector Expansion K-Means Algorithm

    Lijun GAO  Zhenyi BIAN  Maode MA  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2021/04/22
      Vol:
    E104-B No:11
      Page(s):
    1377-1385

    DoS (Denial of Service) attacks are becoming one of the most serious security threats to global networks. We analyze the existing DoS detection methods and defense mechanisms in depth. In recent years, K-Means and improved variants have been widely examined for security intrusion detection, but the detection accuracy to data is not satisfactory. In this paper we propose a multi-dimensional space feature vector expansion K-Means model to detect threats in the network environment. The model uses a genetic algorithm to optimize the weight of K-Means multi-dimensional space feature vector, which greatly improves the detection rate against 6 typical Dos attacks. Furthermore, in order to verify the correctness of the model, this paper conducts a simulation on the NSL-KDD data set. The results show that the algorithm of multi-dimensional space feature vectors expansion K-Means improves the recognition accuracy to 96.88%. Furthermore, 41 kinds of feature vectors in NSL-KDD are analyzed in detail according to a large number of experimental training. The feature vector of the probability positive return of security attack detection is accurately extracted, and a comparison chart is formed to support subsequent research. A theoretical analysis and experimental results show that the multi-dimensional space feature vector expansion K-Means algorithm has a good application in the detection of DDos attacks.

  • HTTP DDoS Flooding Attack Mitigation in Software-Defined Networking

    Sungho PARK  Youngjun KIM  Hyungoo CHOI  Yeunwoong KYUNG  Jinwoo PARK  

     
    LETTER-Information Network

      Pubricized:
    2021/06/04
      Vol:
    E104-D No:9
      Page(s):
    1496-1499

    HTTP Distributed Denial of Service (DDoS) flooding attack aims to deplete the connection resources of a targeted web server by transmitting a massive amount of HTTP request packets using botnets. This type of attack seriously deteriorates the service quality of the web server by tying up its connection resources and uselessly holds up lots of network resources like link capacity and switching capability. This paper proposes a defense method for mitigating HTTP DDoS flooding attack based on software-defined networking (SDN). It is demonstrated in this paper that the proposed method can effectively defend the web server and preserve network resources against HTTP DDoS flooding attacks.

  • Multiclass Dictionary-Based Statistical Iterative Reconstruction for Low-Dose CT

    Hiryu KAMOSHITA  Daichi KITAHARA  Ken'ichi FUJIMOTO  Laurent CONDAT  Akira HIRABAYASHI  

     
    PAPER-Numerical Analysis and Optimization

      Pubricized:
    2020/10/06
      Vol:
    E104-A No:4
      Page(s):
    702-713

    This paper proposes a high-quality computed tomography (CT) image reconstruction method from low-dose X-ray projection data. A state-of-the-art method, proposed by Xu et al., exploits dictionary learning for image patches. This method generates an overcomplete dictionary from patches of standard-dose CT images and reconstructs low-dose CT images by minimizing the sum of a data fidelity and a regularization term based on sparse representations with the dictionary. However, this method does not take characteristics of each patch, such as textures or edges, into account. In this paper, we propose to classify all patches into several classes and utilize an individual dictionary with an individual regularization parameter for each class. Furthermore, for fast computation, we introduce the orthogonality to column vectors of each dictionary. Since similar patches are collected in the same cluster, accuracy degradation by the orthogonality hardly occurs. Our simulations show that the proposed method outperforms the state-of-the-art in terms of both accuracy and speed.

  • A Lightweight Detection Using Bloom Filter against Flooding DDoS Attack

    Sanghun CHOI  Yichen AN  Iwao SASASE  

     
    PAPER-Information Network

      Pubricized:
    2020/09/14
      Vol:
    E103-D No:12
      Page(s):
    2600-2610

    The flooding DDoS attack is a serious problem these days. In order to detect the flooding DDoS attack, the survival approaches and the mitigation approaches have been investigated. Since the survival approach occurs the burden on the victims, the mitigation approach is mainly studied. As for the mitigation approaches, to detect the flooding DDoS attack, the conventional schemes using the bloom filter, machine learning, and pattern analyzation have been investigated. However, those schemes are not effective to ensure the high accuracy (ACC), the high true positive rate (TPR), and the low false positive rate (FPR). In addition, the data size and calculation time are high. Moreover, the performance is not effective from the fluctuant attack packet per second (pps). In order to effectively detect the flooding DDoS attack, we propose the lightweight detection using bloom filter against flooding DDoS attack. To detect the flooding DDoS attack and ensure the high accuracy, the high true positive rate, and the low false positive rate, the dec-all (decrement-all) operation and the checkpoint are flexibly changed from the fluctuant pps in the bloom filter. Since we only consider the IP address, all kinds of flooding attacks can be detected without the blacklist and whitelist. Moreover, there is no complexity to recognize the attack. By the computer simulation with the datasets, we show our scheme achieves an accuracy of 97.5%. True positive rate and false positive rate show 97.8% and 6.3%, respectively. The data size for processing is much small as 280bytes. Furthermore, our scheme can detect the flooding DDoS attack at once in 11.1sec calculation time.

  • Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers Open Access

    Takayuki SASAKI  Carlos HERNANDEZ GAÑÁN  Katsunari YOSHIOKA  Michel VAN EETEN  Tsutomu MATSUMOTO  

     
    PAPER

      Pubricized:
    2019/11/12
      Vol:
    E103-B No:4
      Page(s):
    389-404

    Distributed Denial of Service attacks against the application layer (L7 DDoS) are among the most difficult attacks to defend against because they mimic normal user behavior. Some mitigation techniques against L7 DDoS, e.g., IP blacklisting and load balancing using a content delivery network, have been proposed; unfortunately, these are symptomatic treatments rather than fundamental solutions. In this paper, we propose a novel technique to disincentivize attackers from launching a DDoS attack by increasing attack costs. Assuming financially motivated attackers seeking to gain profit via DDoS attacks, their primary goal is to maximize revenue. On the basis of this assumption, we also propose a mitigation solution that requires mining cryptocurrencies to access servers. To perform a DDoS attack, attackers must mine cryptocurrency as a proof-of-work (PoW), and the victims then obtain a solution to the PoW. Thus, relative to attackers, the attack cost increases, and, in terms of victims, the economic damage is compensated by the value of the mined coins. On the basis of this model, we evaluate attacker strategies in a game theory manner and demonstrate that the proposed solution provides only negative economic benefits to attackers. Moreover, we implement a prototype to evaluate performance, and we show that this prototype demonstrates practical performance.

  • Localization Method Using Received Signal Strength for Wireless Power Transmission of the Capsule Endoscope Open Access

    Daijiro HIYOSHI  Masaharu TAKAHASHI  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2019/02/18
      Vol:
    E102-B No:8
      Page(s):
    1660-1667

    In recent years, capsule endoscopy has attracted attention as one of the medical devices that examine internal digestive tracts without burdening patients. Wireless power transmission of the capsule endoscope has been researched now, and the power transmission efficiency can be improved by knowing the capsule location. In this paper, we develop a localization method wireless power transmission. Therefore, a simple algorithm for using received signal strength (RSS) has been developed so that position estimation can be performed in real time, and the performance is evaluated by performing three-dimensional localization with eight receiving antennas.

  • Dependable Wireless Feedback Loop Control Schemes Considering Errors and Delay in Sensing Data and Control Command Packets

    Satoshi SEIMIYA  Takumi KOBAYASHI  Ryuji KOHNO  

     
    PAPER

      Pubricized:
    2018/12/19
      Vol:
    E102-B No:6
      Page(s):
    1113-1120

    In this study, under the assumption that a robot (1) has a remotely controllable yawing camera and (2) moves in a uniform linear motion, we propose and investigate how to improve the target recognition rate with the camera, by using wireless feedback loop control. We derive the allowable data rate theoretically, and, from the viewpoint of error and delay control, we propose and evaluate QoS-Hybrid ARQ schemes under data rate constraints. Specifically, the theoretical analyses derive the maximum data rate for sensing and control based on the channel capacity is derived with the Shannon-Hartley theorem and the path-loss channel model inside the human body, i.e. CM2 in IEEE 802.15.6 standard. Then, the adaptive error and delay control schemes, i.e. QoS-HARQ, are proposed considering the two constraints: the maximum data rate and the velocity of the camera's movement. For the performance evaluations, with the 3D robot simulator GAZEBO, we evaluated our proposed schemes in the two scenarios: the static environment and the dynamic environment. The results yield insights into how to improve the recognition rate considerably in each situation.

  • Dose-Volume Histogram Evaluations Using Sparsely Measured Radial Data from Two-Dimensional Dose Detectors

    Yasushi ONO  Katsuya KONDO  Kazu MISHIBA  

     
    LETTER-Image

      Vol:
    E101-A No:11
      Page(s):
    1993-1998

    Intensity modulated radiation therapy (IMRT), which irradiates doses to a target organ, calculates the irradiation dose using the radiation treatment planning system (RTPS). The irradiation quality is ensured by verifying that the dose distribution planned by RTPS is the same as the data measured by two-dimensional (2D) detectors. Since an actual three-dimensional (3D) distribution of irradiated dose spreads complicatedly, it is different from that of RTPS. Therefore, it is preferable to evaluate by using not only RTPS, but also actual irradiation dose distribution. In this paper, in order to perform a dose-volume histogram (DVH) evaluation of the irradiation dose distribution, we propose a method of correcting the dose distribution of RTPS by using sparsely measured radial data from 2D dose detectors. And we perform a DVH evaluation of irradiation dose distribution and we show that the proposed method contributes to high-precision DVH evaluation. The experimental results show that the estimates are in good agreement with the measured data from the 2D detectors and that the peak signal to noise ratio and the structural similarity indexes of the estimates are more accurate than those of RTPS. Therefore, we present the possibility of an evaluation of the actual irradiation dose distribution using measured data in a limited observation direction.

  • Source-Side Detection of DRDoS Attack Request with Traffic-Aware Adaptive Threshold

    Sinh-Ngoc NGUYEN  Van-Quyet NGUYEN  Giang-Truong NGUYEN  JeongNyeo KIM  Kyungbaek KIM  

     
    LETTER-Information Network

      Pubricized:
    2018/03/12
      Vol:
    E101-D No:6
      Page(s):
    1686-1690

    Distributed Reflective Denial of Services (DRDoS) attacks have gained huge popularity and become a major factor in a number of massive cyber-attacks. Usually, the attackers launch this kind of attack with small volume of requests to generate a large volume of attack traffic aiming at the victim by using IP spoofing from legitimate hosts. There have been several approaches, such as static threshold based approach and confirmation-based approach, focusing on DRDoS attack detection at victim's side. However, these approaches have significant disadvantages: (1) they are only passive defences after the attack and (2) it is hard to trace back the attackers. To address this problem, considerable attention has been paid to the study of detecting DRDoS attack at source side. Because the existing proposals following this direction are supposed to be ineffective to deal with small volume of attack traffic, there is still a room for improvement. In this paper, we propose a novel method to detect DRDoS attack request traffic on SDN(Software Defined Network)-enabled gateways in the source side of attack traffic. Our method adjusts the sampling rate and provides a traffic-aware adaptive threshold along with the margin based on analysing observed traffic behind gateways. Experimental results show that the proposed method is a promising solution to detect DRDoS attack request in the source side.

  • Capsule Antenna Design Based on Transmission Factor through the Human Body

    Yang LI  Hiroyasu SATO  Qiang CHEN  

     
    PAPER-Antennas

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    357-363

    To design antennas for ingestible capsule endoscope systems, the transmission factors of dipole and loop antennas placed in the torso-shaped phantom filled with deionized water or human body equivalent liquid (HBEL) are investigated by numerical and experimental study. The S-parameter method is used to evaluate transmission characteristics through a torso-shaped phantom in a broadband frequency range. Good agreement of S-parameters between measured results and numerical analysis is observed and the transmission factors for both cases are obtained. Comparison of the transmission factors between HBEL and deionized water is presented to explain the relation between conductivity and the transmission characteristics. Two types of antennas, dipole antenna and loop antenna are compared. In the case of a dipole antenna placed in deionized water, it is observed that the transmission factor decreases as conductivity increases. On the other hand, there is a local maximum in the transmission factor at 675 MHz in the case of HBEL. This phenomenon is not observed in the case of a loop antenna. The transmission factor of capsule dipole antenna and capsule loop antenna are compared and the guideline in designing capsule antennas by using transmission factor is also proposed.

  • Trustworthy DDoS Defense: Design, Proof of Concept Implementation and Testing

    Mohamad Samir A. EID  Hitoshi AIDA  

     
    PAPER-Internet Security

      Pubricized:
    2017/05/18
      Vol:
    E100-D No:8
      Page(s):
    1738-1750

    Distributed Denial of Service (DDoS) attacks based on HTTP and HTTPS (i.e., HTTP(S)-DDoS) are increasingly popular among attackers. Overlay-based mitigation solutions attract small and medium-sized enterprises mainly for their low cost and high scalability. However, conventional overlay-based solutions assume content inspection to remotely mitigate HTTP(S)-DDoS attacks, prompting trust concerns. This paper reports on a new overlay-based method which practically adds a third level of client identification (to conventional per-IP and per-connection). This enhanced identification enables remote mitigation of more complex HTTP(S)-DDoS categories without content inspection. A novel behavior-based reputation and penalty system is designed, then a simplified proof of concept prototype is implemented and deployed on DeterLab. Among several conducted experiments, two are presented in this paper representing a single-vector and a multi-vector complex HTTP(S)-DDoS attack scenarios (utilizing LOIC, Slowloris, and a custom-built attack tool for HTTPS-DDoS). Results show nearly 99.2% reduction in attack traffic and 100% chance of legitimate service. Yet, attack reduction decreases, and cost in service time (of a specified file) rises, temporarily during an approximately 2 minutes mitigation time. Collateral damage to non-attacking clients sharing an attack IP is measured in terms of a temporary extra service time. Only the added identification level was utilized for mitigation, while future work includes incorporating all three levels to mitigate switching and multi-request per connection attack categories.

  • Improving Security Level of LTE Access Procedure by Using Short-Life Shared Key

    Fawad AHMAD  Marnel PERADILLA  Akanksha SAINI  Younchan JUNG  

     
    PAPER-Network

      Pubricized:
    2016/11/21
      Vol:
    E100-B No:5
      Page(s):
    738-748

    To ensure secure mobile communication, the communicating entities must know their mutual identities. The entities which need to be identified in a mobile communication system are mobile devices and the network. Third Generation Partnership Project (3GPP) has specified Evolved Packet System Authentication and Key Agreement (EPS AKA) procedure for the mutual authentication of user and the Long Term Evolution (LTE) network. EPS AKA certainly overcomes most of the vulnerabilities in the Global System for Mobile Communications (GSM) and Universal Mobile Telecommunication System (UMTS) access procedures. However, the LTE access procedure still has security weaknesses against some of the sophisticated security threats, such as, Denial-of-Service (DoS) attacks, Man-in-the-Middle (MitM) attacks, rogue base station attacks and fails to ensure privacy protection for some of the important parameters. This paper proposes an improved security framework for the LTE access procedure by ensuring the confidentiality protection of International Mobile Subscriber Identity (IMSI) and random-challenge RAND. Also, our proposed system is designed to reduce the impact of DoS attacks which try to overwhelm the network with useless computations. We use a one-time shared key with a short lifetime between the UE and MME to protect IMSI and RAND privacy. Finally, we explore the parameters design for the proposed system which leads to satisfy the requirements imposed on computational load and latency as well as security strength.

  • A Collaborative Intrusion Detection System against DDoS for SDN

    Xiaofan CHEN  Shunzheng YU  

     
    LETTER-Information Network

      Pubricized:
    2016/06/01
      Vol:
    E99-D No:9
      Page(s):
    2395-2399

    DDoS remains a major threat to Software Defined Networks. To keep SDN secure, effective detection techniques for DDoS are indispensable. Most of the newly proposed schemes for detecting such attacks on SDN make the SDN controller act as the IDS or the central server of a collaborative IDS. The controller consequently becomes a target of the attacks and a heavy loaded point of collecting traffic. A collaborative intrusion detection system is proposed in this paper without the need for the controller to play a central role. It is deployed as a modified artificial neural network distributed over the entire substrate of SDN. It disperses its computation power over the network that requires every participating switch to perform like a neuron. The system is robust without individual targets and has a global view on a large-scale distributed attack without aggregating traffic over the network. Emulation results demonstrate its effectiveness.

  • Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach

    Tae Hwan KIM  Dong Seong KIM  Hee Young JUNG  

     
    PAPER-Internet

      Vol:
    E99-B No:7
      Page(s):
    1511-1522

    This paper presents a novel defense scheme for DDoS attacks that uses an image processing method. This scheme especially focused on the prevalence of adjacent neighbor spoofing, called subnet spoofing. It is rarely studied and there is few or no feasible approaches than other spoofing attacks. The key idea is that a “DDoS attack with IP spoofing” is represented as a specific pattern such as a “line” on the spatial image planes, which can be recognized through an image processing technique. Applying the clustering technique to the lines makes it possible to identify multiple attack source networks simultaneously. For the identified networks in which the zombie hosts reside, we then employ a signature-based pattern extraction algorithm, called a pivoted movement, and the DDoS attacks are filtered by correlating the IP and media access control pairing signature. As a result, this proposed scheme filters attacks without disturbing legitimate traffic. Unlike previous IP traceback schemes such as packet marking and path fingerprinting, which try to diagnose the entire attack path, our proposed scheme focuses on identifying only the attack source. Our approach can achieve an adaptive response to DDoS attacks, thereby mitigating them at the source, while minimizing the disruption of legitimate traffic. The proposed scheme is analyzed and evaluated on the IPv4 and IPv6 network topology from CAIDA, the results of which show its effectiveness.

  • Defending DDoS Attacks in Software-Defined Networking Based on Legitimate Source and Destination IP Address Database

    Xiulei WANG  Ming CHEN  Changyou XING  Tingting ZHANG  

     
    PAPER-Network security

      Pubricized:
    2016/01/13
      Vol:
    E99-D No:4
      Page(s):
    850-859

    The availability is an important issue of software-defined networking (SDN). In this paper, the experiments based on a SDN testbed showed that the resource utilization of the data plane and control plane changed drastically when DDoS attacks happened. This is mainly because the DDoS attacks send a large number of fake flows to network in a short time. Based on the observation and analysis, a DDoS defense mechanism based on legitimate source and destination IP address database is proposed in this paper. Firstly, each flow is abstracted as a source-destination IP address pair and a legitimate source-destination IP address pair database (LSDIAD) is established by historical normal traffic trace. Then the proportion of new source-destination IP address pair in the traffic per unit time is cumulated by non-parametric cumulative sum (CUSUM) algorithm to detect the DDoS attacks quickly and accurately. Based on the alarm from the non-parametric CUSUM, the attack flows will be filtered and redirected to a middle box network for deep analysis via south-bound API of SDN. An on-line updating policy is adopted to keep the LSDIAD timely and accurate. This mechanism is mainly implemented in the controller and the simulation results show that this mechanism can achieve a good performance in protecting SDN from DDoS attacks.

  • Performance Evaluation on GA-Based Localization for Wireless Capsule Endoscope Using Scattered Electric Fields

    Taiki IIDA  Daisuke ANZAI  Jianqing WANG  

     
    PAPER

      Vol:
    E99-B No:3
      Page(s):
    578-585

    To improve the performance of capsule endoscope, it is important to add location information to the image data obtained by the capsule endoscope. There is a disadvantage that a lot of existing localization techniques require to measure channel model parameters in advance. To avoid such a troublesome pre-measurement, this paper pays attention to capsule endoscope localization based on an electromagnetic imaging technology which can estimate not only the location but also the internal structure of a human body. However, the electromagnetic imaging with high resolution has huge computational complexity, which should prevent us from carrying out real-time localization. To ensure the accurate real-time localization system without pre-measured model parameters, we apply genetic algorithm (GA) into the electromagnetic imaging-based localization method. Furthermore, we evaluate the proposed GA-based method in terms of the simulation time and the location estimation accuracy compared to the conventional methods. In addition, we show that the proposed GA-based method can perform more accurately than the other conventional methods, and also, much less computational complexity of the proposed method can be accomplished than a greedy algorithm-based method.

1-20hit(76hit)