DDoS Attack Detection Using Unique Source IP Deviation
نویسندگان
چکیده
In this paper we present a low cost yet robust DDoS detection method to identify all classes of DDoS attacks. Our method attempts to detect DDoS attack by monitoring the deviation of the count of unique source IPs and the count of source IPs whose transmission rate is higher than a given threshold value. Unlike other similar existing methods, our method does not need to maintain a list of source IPs which makes our detection method faster. Another advantage of our method is the ability to detect attack performed by small size bot net. In case of such an attack the packet rate of the attack sources deviate from its mean value significantly and thus we can detect this change. We use a non-parametric change point modeling technique to identify flooding attacks of all types in real time. An other contribution of this work is the development of an attack took referred to as TU-CANNON, to generate different variations of DDoS attack under a controlled test-bed environment.
منابع مشابه
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملSource Identification of Spoofed DDoS Attacks using an Image Processing Approach
This paper presents a novel source identification scheme for spoofed DDoS attacks using an image processing method. The key idea is that “DDoS attack traffic” that uses subnet spoofing is represented as “lines” on the spatial image planes, and they can be recognized by an edge detection algorithm. Applying the clustering technique to the lines makes it possible to identify multiple attack sourc...
متن کاملDefending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning
In recent years, distributed denial of service (DDoS) attacks have brought increasing threats to the Internet since attack traffic caused by DDoS attacks can consume lots of bandwidth or computing resources on the Internet and the availability of DDoS attack tools has become more and more easy. However, due to the similarity between DDoS attack traffic and transient bursts of normal traffic, it...
متن کاملA Novel Technique for Detecting DDoS Attacks at Its Early Stage
Spoofing source IP addresses is always utilized to perform Distributed Denial-of-Service (DDoS) attacks. Most of current detection and prevention methods against DDoS ignore the innocent side, whose IP is utilized as the spoofed IP by the attacker. In this paper, a novel method has been proposed to against the direct DDoS attacks, which consists of two components: the client detector and the se...
متن کاملE-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
Distributed denial-of-service (DDoS) attacks cause havoc by exploiting threats to Internet services. In this paper, we propose E-LDAT, a lightweight extended-entropy metric-based system for both DDoS flooding attack detection and IP (Internet Protocol) traceback. It aims to identify DDoS attacks effectively by measuring the metric difference between legitimate traffic and attack traffic. IP tra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 19 شماره
صفحات -
تاریخ انتشار 2017