An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
نویسنده
چکیده
In the aspect of intrusion detection, reliable detection remains a challenge issue as stated in Kemmrer and Vigna (Suppl IEEE Comput (IEEE Secur Priv) 35(4) (2002) 28). ‘‘The challenge is to develop a system that detects close to 100% of attacks with minimal false positives. We are still far from achieving this goal.’’ Hence, reliable detection of distributed denial-of-service (DDOS) attacks is worth studying. By reliable detection, we mean that signs of attacks can be identified with predetermined detection probability and false alarm probability. This paper focuses on reliable detection of DDOS flood attacks by identifying pattern of traffic with long-range dependence (LRD). In this aspect, there are three fundamental issues in theory and practice: What is a statistical feature of traffic to be used for pattern recognition? How to represent distributions of identification probability, false alarm probability and miss probability? How to assure a decision-making that has high identification probability, low false alarm probability and low miss probability? This paper gives a statistical detection scheme based on identifying abnormal variations of LRD traffic time series. The representations of three probability distributions mentioned above are given and a decision-making region is explained. With this region, one can know what an identification (or false alarm or miss) probability is for capturing signs of DDOS flood attacks. The significance of a decision-making region is that it provides a guideline to set appropriate threshold value so as to assure high identification probability, low false alarm probability and low miss probability. A case study is demonstrated. a 2004 Elsevier Ltd. All rights reserved.
منابع مشابه
Reliably Identifying Traffic Abnormality under DDOS Flood Attacks in Differentiated Services Environment Based on Traffic Constraint
This paper presents a reliable approach to identifying signs of traffic abnormality under DDOS flood attacks in static-priority scheduling networks with differentiated services (DiffServ) at connection level. The probability formulas in terms of identification, miss, and false alarm, as well as identification threshold, are derived. A case study is demonstrated.
متن کاملA Model to Partly but Reliably Distinguish DDOS Flood Traffic from Aggregated One
Reliable distinguishing DDOS flood traffic from aggregated traffic is desperately desired by reliable prevention of DDOS attacks. By reliable distinguishing, we mean that flood traffic can be distinguished from aggregated one for a predetermined probability. The basis to reliably distinguish flood traffic from aggregated one is reliable detection of signs of DDOS flood attacks. As is known, rel...
متن کاملNote on Studying Change Point of LRD Traffic Based on Li's Detection of DDoS Flood Attacking
Distributed denial-of-service DDoS flood attacks remain great threats to the Internet. To ensure network usability and reliability, accurate detection of these attacks is critical. Based on Li’s work on DDoS flood attack detection, we propose a DDoS detection method by monitoring the Hurst variation of long-range dependant traffic. Specifically, we use an autoregressive system to estimate the H...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملDDA: An Approach to Handle DDoS (Ping Flood) Attack
Distributed denial of service attack (DDoS) is an attempt by malicious hosts to overload website, network, e-mail servers, applications, network resources, bandwidth, etc. Globally DDoS attacks affected four out of ten organizations (around 41 %) over the past few years. Challenges involved in taking counter measures against DDoS attacks are network infrastructure, identifying legitimate traffi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 23 شماره
صفحات -
تاریخ انتشار 2004