Denial of service attack detection based on a non Gaussian and multiresolution traffic modeling

نویسندگان

  • P. Borgnat
  • P. Abry
  • G. Dewaele
  • N. Larrieu
  • P. Owezarski
  • Y. Zhang
  • Y. Labit
  • J. Aussibal
  • L. Gallon
  • A. Scherrer
  • L. Bernaille
  • K. Boudaoud
چکیده

We design Distributed Denial of Service (DDoS) detection procedures based on a non Gaussian modeling of the marginal distributions of aggregated Internet traffic. The theoretical and practical relevances of this modeling is illustrated and discussed. From this modeling, various statistical distances (Mean Quadratic Distance of Kullback Divergence) between an observation and a reference time window are computed. We show and illustrate that anomalously large values observed on these distances betray major changes in the statistics of Internet times series and correspond to the occurrences of illegitimate anomalies such as DDoS attacks. Hence, thresholding these distances enables the design of attack detection procedures. Their central feature lies in their being multiresolution in nature: time series aggregated at several levels are jointly analyzed. The assessment of the statistical performance of detection procedures in Internet is a difficult issue as no repository of traffic containing well-documented attacks is available. To overcome this, we decided and chose to perform our own collection of DDoS attacks (with precisely controlled characteristics) and collected the corresponding traffic. This enables us to evaluate the performance (detection versus false alarm probabilities) of the proposed detection procedures and to show that they present satisfactory performance with a 1 min reaction time, even for attacks whose intensity is low.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

متن کامل

Detecting Denial of Service Message Flooding Attacks in SIP based Services

Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its ‎security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol ‎‎(SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation ‎deficiencies cause some security concerns in SIP based infra...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

متن کامل

A Review of Intrusion Detection Defense Solutions Based on Software Defined Network

Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006