Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router

نویسندگان

  • Ruoyu Yan
  • Qinghua Zheng
  • Haifei Li
چکیده

Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly, a new type of unidirectional flow called IF flow is proposed. Merits and features of IF flows are analyzed in detail and then two efficient methods are introduced in our DDoS attacks detection and evaluation scheme. The first method uses residual variance ratio to detect DDoS attacks after Recursive Least Square (RLS) filter is applied to predict IF flows. The second method uses generalized likelihood ratio (GLR) statistical test to detect DDoS attacks after a Kalman filter is applied to estimate IF flows. Based on the two complementary methods, an evaluation formula is proposed to assess the seriousness of current DDoS attacks on router ports. Furthermore, the sensitivity of three types of traffic (IF flow, input link and output link) to DDoS attacks is analyzed and compared. Experiments show that IF flow has more power to expose anomaly than the other two types of traffic. Finally, two proposed methods are compared in terms of detection rate, processing speed, etc., and also compared in detail with Principal Component Analysis (PCA) and Cumulative Sum (CUSUM) methods. The results demonstrate that adaptive filter methods have higher detection rate, lower false alarm rate and smaller detection lag time.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Collaborative detection and filtering of shrew DDoS attacks using spectral analysis

This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and low-rate in attack volume, very different from the flooding type of attacks. They are launched with high narrow spikes in very low frequency, periodically. Thus, shrew attacks may endanger the victim systems for a long...

متن کامل

TCP Flow Analysis for Defense against Shrew DDoS Attacks

The shrew or RoS attacks are low-rate DDoS attacks that degrade the QoS to end systems slowly but not to deny the services completely. These attacks are more difficult to detect than the flooding type of DDoS attacks. In this paper, we explore the energy distributions of Internet traffic flows in frequency domain. Normal TCP traffic flows present some form of periodicity because of TCP protocol...

متن کامل

Differential Packet Filtering Against DDoS Flood Attacks

We present a new packet filtering scheme, which is traffic-smart to defend against network worms and flood attacks. The scheme prevents malicious hackers from orchestrating DDoS flooding attacks on any IP-based public network. All packets from each IP source are counted and timed during their life cycles. Special IP counters and timers are used to support the filtering process. This new approac...

متن کامل

Detecting DDoS Attacks in Stub Domains

Title of dissertation: DETECTING DDoS ATTACKS IN STUB DOMAINS Christopher Kommareddy, Doctor of Philosophy, 2006 Dissertation directed by: Prof. Samrat Bhattacharjee Department of Computer Science Dr. Richard La Department of Electrical & Computer Engineering DoS attacks have least impact when detected and mitigated close to the attacks’ source. This is more important for Distributed DoS (DDoS)...

متن کامل

An IP-Traceback-based Packet Filtering Scheme for Eliminating DDoS Attacks

Distributed Denial-of-Service (DDoS) is still an important security challenge for computer networks. Filterbased DDoS defense is considered as an effective approach, since it can defend against both victim-resourceconsumption attacks and link-congestion attacks. However, the high possibility of false positive and the huge consumption of router resources reduce the practicality of existing filte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • TIIS

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2010