Information theory based detection against network behavior mimicking DDoS attacks


Autoria(s): Yu, Shui; Zhou, Wanlei; Doss, Robin
Data(s)

01/04/2008

Resumo

DDoS is a spy-on-spy game between attackers and detectors. Attackers are mimicking network traffic patterns to disable the detection algorithms which are based on these features. It is an open problem of discriminating the mimicking DDoS attacks from massive legitimate network accessing. We observed that the zombies use controlled function(s) to pump attack packages to the victim, therefore, the attack flows to the victim are always share some properties, e.g. packages distribution behaviors, which are not possessed by legitimate flows in a short time period. Based on this observation, once there appear suspicious flows to a server, we start to calculate the distance of the package distribution behavior among the suspicious flows. If the distance is less than a given threshold, then it is a DDoS attack, otherwise, it is a legitimate accessing. Our analysis and the preliminary experiments indicate that the proposed method- can discriminate mimicking flooding attacks from legitimate accessing efficiently and effectively. <br />

Identificador

http://hdl.handle.net/10536/DRO/DU:30017608

Idioma(s)

eng

Publicador

IEEE

Relação

http://dro.deakin.edu.au/eserv/DU:30017608/yu-informationtheory-2008.pdf

http://dx.doi.org/10.1109/LCOMM.2008.072049

Direitos

2008, IEEE

Palavras-Chave #DDoS detection #distribution distance
Tipo

Journal Article