Mitigating ROQ Attacks using Flow Monitoring Method

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2013 by IJETT Journal
Volume-4 Issue-9                      
Year of Publication : 2013
Authors : Seema Gulati , Amandeep Singh Dhaliwal


Seema Gulati , Amandeep Singh Dhaliwal. "Mitigating ROQ Attacks using Flow Monitoring Method". International Journal of Engineering Trends and Technology (IJETT). V4(9):4074-4079 Sep 2013. ISSN:2231-5381. published by seventh sense research group.


Reduction of Quality attacks is a milder form of the DOS attacks but these are more difficult to detect than the traditional flooding attacks. The goal of these attacks do - not wish to completely cut - off services and re sources or damage resources, instead only wish to reduce the QoS offered to the users of the systems and the services of the system. These attacks send traffic at a sufficiently low average rate to evade the detection systems, and try to keep the systems o scillate between over load and under load conditions. Unlike the traditional DOS attacks which limit the steady state capacity of a system, these target the adaptive behavior of the TCP congestion control mechanism. In this paper a flow monitoring techniqu e is proposed to mitigate the impact of ROQ attacks in wireless networks. The simulation results show that the proposed technique helps to reduce packet loss and improves throughput.


[1] A. Kuzmanovic and E. Knightly, “Low - rate TCP - targeted denial of service attacks (The Shrew vs. the Mice and Elephants)”, ACM SIGCOMM 2003, p p. 75 – 86, 2003.
[2] Mina Guirguis, Azer Bestavros and Ibrahim Matta, “Exploiting the transients of adaptation for RoQ attacks on Internet resources”, IEEE ICNP 2004, pp. 184 – 195, 2004.
[3] Mina Guirguis, Azer Bestavros and Ibrahim Matta, “Bandwidth Stealing via Li nk Targeted RoQ Attacks”, IEEE CCN 2004, 2004.
[4] Y. Xu, R. Guerin, “On the robustness of router - based denial - of - service (DoS) defense systems”, ACM Computer Communications, Vol. 35, No. 3, pp. 47 – 60, 2005.
[5] Amey Shevtekar, Karunakar Anantharam, and Nirwan An sari, “Low Rate TCP Denial - of - Service Attack Detection at Edge Routers”, IEEE Communications Letters, Vol. 9, No. 4, April 2005.
[6] Amey Shevtekar and Nirwan Ansari, A router based technique to mitigate reduction of quality (RoQ) attacks, Computer Networks , V ol. 52, pp. 957 – 970, 2008.
[7] Yu Chen, Kai Hwang,” Collaborative detection and filtering of Shrew DDoS attacks using spectral analysis”, Journal of Parallel and Distributed Computing, Special Issue on Security in Grids and Distributed Systems, Vol. 66, No. 9, 2006.
[8] Yu Chen and Kai Hwang, “Spectral Analysis of TCP flows for Defense against Reduction - of - Quality Attacks”, IEEE International Conference on Communications (ICC 2007), 2007.
[9] Jatinder Singh, Dr. Savita Gupta, and Dr. Lakhwinder Kaur “A MAC Layer Based Defense Architecture for Reduction - of - Quality (RoQ) Attacks in Wireless LAN”, International Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010.
[10] Rupa Rani an d A.K. Vatsa, “CARD (Continuous and Random Dropping) based DRDOS Attack Detection and Prevention Techniques in MANET”, International Journal of Engineering and Technology, Volume 2 No. 8, August, 2012.
[11] S. Venkatasubramanian and N. P. Gopalan, “ A Flow Monit oring based Distributed Defense Technique for Reduction of Quality Attacks in MANET”, International Journal of Computer Applications (0975 – 8887), Volume 21 – No.1, May 2011.
[12] S. A. Arunmozhi and Y. Venkataramani, “A Flow Monitoring Scheme to Defend Reducti on - of - Quality (RoQ) Attacks in Mobile Ad - hoc Networks”, Information Security Journal: A Global Perspective , Vol.19, No.5, 2010, pp. 263 - 272.
[13] Arunmozhi Annamalai and Venkataramani Yegnanarayanan, “ Secured System against DDoS Attack in Mobile Adhoc Network ” , WSEAS Transactions on Communications, Issue 9, Volume 11, September 2012
[14] K. Kuppusamy and S. Malathi, “An Effective Prevention Of Attacks Using GI Time Frequency Algorithm Under DDOS”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011.

ROQ, DDOS, Shrew, RTO, RTT, TCP time - out .