Award Abstract # 0847869
SGER: A New Approach for Identifying DoS Attackers Based on Group Testing Techniques

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF FLORIDA
Initial Amendment Date: August 25, 2008
Latest Amendment Date: August 25, 2008
Award Number: 0847869
Award Instrument: Standard Grant
Program Manager: Sajal Das
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2008
End Date: August 31, 2010 (Estimated)
Total Intended Award Amount: $150,000.00
Total Awarded Amount to Date: $150,000.00
Funds Obligated to Date: FY 2008 = $150,000.00
History of Investigator:
  • My Thai (Principal Investigator)
    mythai@cise.ufl.edu
Recipient Sponsored Research Office: University of Florida
1523 UNION RD RM 207
GAINESVILLE
FL  US  32611-1941
(352)392-3516
Sponsor Congressional District: 03
Primary Place of Performance: University of Florida
1523 UNION RD RM 207
GAINESVILLE
FL  US  32611-1941
Primary Place of Performance
Congressional District:
03
Unique Entity Identifier (UEI): NNFQH1JAPEP3
Parent UEI:
NSF Program(s): Networking Technology and Syst
Primary Program Source: 01000809DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 9218, 9237, HPCC
Program Element Code(s): 736300
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

One of the most critical problems in Internet security is
the Denial-of-Service (DoS) attack, which aims to make a
service unavailable to legitimate clients. In this project,
we consider a sophisticated attack, called service-level DoS
attack, which is very difficult to identify as malicious
requests can be made arbitrarily similar to legitimate ones
and can bypass the network-based defense systems. We propose
a novel framework to detect the attackers based on the group
testing (GT) technique which can overcome the limitations of
current detection approaches. More specifically, this project
seeks to investigate the following challenges: 1) Dynamic
threshold model is studied to handle the legitimate bursts
and variance in the number of clients on each server; 2)
Legitimates and malicious requests are similar, required
new testing design without examining each request one by
one or tightly specifying legitimate behaviors; 3) In
addition, the study of the proposed model evokes a new
type of GT, called Size Constraint Group Testing (SCGT)
which requires an in depth analysis of matrix construction
complexity. This mathematically rigorous framework helps
to minimize the false positive and false negative of detection,
which is the main problem currently for any existing defense
mechanisms.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Y. Xuan, I. Shin, M. T. Thai, and T. Znati "Detecting Application Layer DoS Attacks: A Group Testing Based Approach" IEEE Transactions on Parallel and Distributed Systems (TPDS) , 2010
N. Zhang, I. Shin, F. Zou, W. Wu, and M. T. Thai "Construction of Virtual Backbone with Multiple Factors Constraints in Wireless Ad-hoc Network" Ad hoc & Sensor Wireless Networks , 2010

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page