Discriminating DDoS flows from flash crowds using information distance


Autoria(s): Yu, Shui; Thapngam, Theerasak; Liu, Jianwen; Wei, Su; Zhou, Wanlei
Contribuinte(s)

Xiang, Yang

Lopez, Javier

Wang, Haining

Zhou, Wanlei

Data(s)

01/01/2009

Resumo

Discriminating DDoS flooding attacks from flash crowds poses a tough challenge for the network security community. Because of the vulnerability of the original design of the Internet, attackers can easily mimic the patterns of legitimate network traffic to fly under the radar. The existing fingerprint or feature based algorithms are incapable to detect new attack strategies. In this paper, we aim to differentiate DDoS attack flows from flash crowds. We are motivated by the following fact: the attack flows are generated by the same prebuilt program (attack tools), however, flash crowds come from randomly distributed users all over the Internet. Therefore, the flow similarity among DDoS attack flows is much stronger than that among flash crowds. We employ abstract distance metrics, the Jeffrey distance, the Sibson distance, and the Hellinger distance to measure the similarity among flows to achieve our goal. We compared the three metrics and found that the Sibson distance is the most suitable one for our purpose. We apply our algorithm to the real datasets and the results indicate that the proposed algorithm can differentiate them with an accuracy around 65%.<br />

Identificador

http://hdl.handle.net/10536/DRO/DU:30029015

Idioma(s)

eng

Publicador

IEEE

Relação

http://dro.deakin.edu.au/eserv/DU:30029015/yu-discriminatingddosflows-2009.pdf

http://dro.deakin.edu.au/eserv/DU:30029015/yu-nss-2009.pdf

http://doi.ieeecomputersociety.org/10.1109/NSS.2009.29

Direitos

2009, IEEE

Palavras-Chave #DDoS Attack #Distance #Measurement
Tipo

Conference Paper