Detection of Denial-of-QoS Attacks Based On χ Statistic And EWMA Control Charts

نویسندگان

  • Vinay A. Mahadik
  • Xiaoyong Wu
  • Douglas S. Reeves
چکیده

In this paper, we describe a method of detecting denial of Quality of Service attacks on DiffServ networks. Our approach focusses on real time and quick detection, scalability to large networks, and a negligible false alarm generation rate. Sensors sample QoS parameters like bit rate, packet dropping rate, and jitter of specific Virtual Leased Line (VLL) flows at predefined strategic points in their paths. We detect anomalies in sampled network flow statistics using the EWMA Control Chart test for the highly stationary measures and for the rest adapt SRI’s χ statistic based NIDES approach. Our implementation shows that the method has a 100% detection rate for attacks above its threshold level those attacks that produce statistically significant QoS degradation. The detection time is low and less than about 15 minutes. The maximum inherent false alarm generation rate for both the tests and any of the monitored measures combined is of the order of 1 false alarm in 1000 valid status alerts of either normal or under attack. We believe that given the results of the tests on our implementation of the attacks and the detection system, the method is a strong candidate for QoS intrusion detection for a low-cost commercial deployment. ∗Vinay A. Mahadik is pursuing Master of Science in Computer Networking at the NC State University, Raleigh. Email : [email protected] †Xiaoyong Wu is with the Advanced Networking Research Group, MCNC, Research Triangle Park. Email : [email protected] ‡Douglas S. Reeves is with the Department of Computer Science, NC State University, Raleigh. Email : [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

DETECTION OF DENIAL OF QoS ATTACKS ON DIFFSERV NETWORKS

MAHADIK, VINAY ASHOK. Detection of Denial of QoS Attacks on DiffServ Networks. (Under the direction of Dr. Douglas S. Reeves.) In this work, we describe a method of detecting denial of Quality of Service (QoS) attacks on Differentiated Services (DiffServ) networks. Our approach focusses on real time and quick detection, scalability to large networks, and a negligible false alarm generation rate...

متن کامل

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

متن کامل

Asymptotic behavior of the variance of the EWMA statistic for autoregressive processes

Serial correlation can seriously affect the performance of traditional control charts. Many authors have studied the effect of autocorrelation on EWMA control charts and have shown how to modify the control limits to account for autocorrelation. In this paper we compare three different estimation methods for the variance of the EWMA statistic that is adapted to autocorrelated data. This compari...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002