A New Traffic Pattern Matching for DDoS Traceback Using Independent Component Analysis
نویسندگان
چکیده
Recently, Denial of Service(DoS) attacks and Distributed DoS(DDoS) attacks which are stronger form of DoS attacks from plural hosts have become security threats on the Internet. It is important to identify the attack source and to block attack traffic as one of the measures against these attacks. In general, it is difficult to identify them because information about the attack source is falsified. Therefore a method of identifying the attack source by tracing the route of the attack traffic is necessary. A traceback method which uses traffic patterns, using changes in the number of packets over time as criteria for the attack traceback has been proposed. The traceback method using the traffic patterns can trace the attack by matching the shapes of input traffic patterns and the shape of output traffic pattern observed at a network branch point such as a router. The traffic pattern is a shapes of traffic and unfalsifiable information. The proposed trace methods proposed till date cannot obtain enough tracing accuracy, because they directly use traffic patterns which are influenced by non-attack traffics. In this paper, a new traffic pattern matching method using Independent Component Analysis(ICA) is proposed. Keywords—Distributed Denial of Service, Independent Component Analysis, Traffic pattern
منابع مشابه
E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
Distributed denial-of-service (DDoS) attacks cause havoc by exploiting threats to Internet services. In this paper, we propose E-LDAT, a lightweight extended-entropy metric-based system for both DDoS flooding attack detection and IP (Internet Protocol) traceback. It aims to identify DDoS attacks effectively by measuring the metric difference between legitimate traffic and attack traffic. IP tra...
متن کاملSource Identification of Spoofed DDoS Attacks using an Image Processing Approach
This paper presents a novel source identification scheme for spoofed DDoS attacks using an image processing method. The key idea is that “DDoS attack traffic” that uses subnet spoofing is represented as “lines” on the spatial image planes, and they can be recognized by an edge detection algorithm. Applying the clustering technique to the lines makes it possible to identify multiple attack sourc...
متن کاملTraceback of Ddos Attacks Using Entropy Variations
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet which deny normal service and degrade quality of service. However, the Network security mechanisms does not have effective and efficient methods to trace back the source of these attacks. In this paper, I propose a novel traceback method for DDoS attacks that is based on entropy variations between normal and DDoS...
متن کاملDDoS: Survey of Traceback Methods
The problem of identifying Distributed Denial of Service (DDoS) is one of the hardest threats in the internet security. It is important to protect the resource and trace from the Denial of Service (DoS) attack, but it is difficult to distinguish normal traffic and DoS attack traffic because the DoS generally hide their identities/origins. Especially the attackers often use incorrect or spoofed ...
متن کاملIP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks
Distributed Denial of Service (DDoS) is one of the most difficult security problems to address. While many existing techniques (e.g., IP traceback) focus on tracking the location of the attackers after-the-fact, little is done to mitigate the effect of an attack while it is raging on. In this paper, we present a novel technique that can effectively filter out the majority of DDoS traffic, thus ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010