ANALYSIS OF NETWORK TRAFFIC THREATS ACROSS OSI MODEL LAYERS FOR DYNAMIC RTO CALCULATION IN THE CONTEXT OF COMBATING DDoS ATTACKS

DOI: 10.31673/2412-4338.2023.031221

Authors

  • Г. І. Гайдур, (Haidur H. I.) State University of Information and Communication Technologies, Kyiv
  • С. О. Гахов, (Gakhov S. O.) State University of Information and Communication Technologies, Kyiv
  • М. В. Сич, (Sych M. V.) State University of Information and Communication Technologies, Kyiv
  • В. Є. Дмітрієв, (Dmitriiev V. Ye.) State University of Information and Communication Technologies, Kyiv

Abstract

This document provides an examination of current threats to network security, viewed through the lens of network traffic analysis at various OSI model layers. It delves into the different forms of Distributed Denial of Service (DDoS) attacks and their ramifications on the Transmission Control Protocol (TCP), with a specific focus on a critical parameter - the Retransmission Timeout (RTO). The text also divulges fundamental algorithms and techniques for calculating RTO, encompassing adaptive methodologies that harness machine learning and artificial intelligence for optimizing the TCP/IP stack.
In particular, it offers insights into the functioning of the RTO calculation algorithm, a pivotal element ensuring the reliability of data transmission via TCP. The document elaborates on how this algorithm dynamically adjusts the RTO value based on network conditions and measured Round Trip Time (RTT) values. Furthermore, it furnishes formulas for computing RTO with diverse parameters.
Moreover, the document explores the potential of employing machine learning and data analysis methodologies to detect and preempt DDoS attacks. It elucidates how contemporary technologies empower the use of these approaches to minimize false positives in identifying malicious traffic packets, thereby enhancing the effectiveness of safeguarding information systems.
Additionally, it provides an illustration of software and hardware tools employed for the practical implementation of these algorithms in devices facilitating data transmission via Ethernet connections.
In summary, this work offers insights into contemporary challenges and issues in the realm of network security, especially in the context of the escalating frequency of DDoS attacks. This information proves valuable for students and professionals engaged in the study of network security and the development of measures to fortify networks and systems.

Keywords: network security threats, RTO (Retransmission TimeOut), DDoS attacks, TCP protocol, Machine Learning, Network Traffic Optimization.

References:
1. Ferguson, P., Senie, D., & Huston, G. (2000). Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827. Retrieved from https://tools.ietf.org/html/rfc2827
2. Mirkovic, J., & Reiher, P. (2004). A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39-53.
3. Stone, R. (2000). CenterTrack: An IP Overlay Network for Tracking DoS Floods. In Proceedings of the 9th USENIX Security Symposium.
4. Mirkovic, J., & Reiher, P. (2005). A Collaborative Defense Architecture for Mitigating DDoS Attacks. ACM Transactions on Computer Systems (TOCS), 23(3), 250-297.
5. Statista. (2023). Annual amount of financial damage caused by reported cybercrime in the U.S. (2001-2022). Retrieved from https://www.statista.com/statistics/267132/total-damage-caused-by-by-cybercrime-in-the-us/
6. RFC 6298 - Computing TCP's Retransmission Timer (RTO). Retrieved from https://tools.ietf.org/html/rfc6298
7. Unit24. Network Security Trends: November 2021 to January 2022. May 31, 2022 Retrieved from https://unit42.paloaltonetworks.com/network-security-trends-cross-site-scripting/
8. Wang, Z., & Xu, D. (2017). A Survey of Advanced Persistent Threats in Cloud Computing. Journal of Computer and Communications, 5(14), 27-40.
9. Sivanathan, A., & Alazab, M. (2019). Machine Learning for Anomaly Detection and Threat Hunting in Cybersecurity: An Empirical Review. IEEE Access, 7, 159841-159855.
10. Bishop, M. (2003). Computer Security: Art and Science. Addison-Wesley.
11. Researchgate. Global Trend of DDoS Attacks 2018-2023. Retrieved from https://www.researchgate.net/figure/Global-Trend-of-DDoS-Attacks-2018-2023-7_fig1_348639527
12. Cloudflare Radar. Insight into network and application layer attack traffic. Retreived from https://radar.cloudflare.com/security-and-attacks

Published

2023-11-01

Issue

Section

Articles