Distributed denial of service (DDoS) detection by traffic pattern analysis


Autoria(s): Thapngam, Theerasak; Yu, Shui; Zhou, Wanlei; Makki, S.Kami
Data(s)

01/12/2014

Resumo

In this paper, we propose a behavior-based detection that can discriminate Distributed Denial of Service (DDoS) attack traffic from legitimated traffic regardless to various types of the attack packets and methods. Current DDoS attacks are carried out by attack tools, worms and botnets using different packet-transmission rates and packet forms to beat defense systems. These various attack strategies lead to defense systems requiring various detection methods in order to identify the attacks. Moreover, DDoS attacks can craft the traffics like flash crowd events and fly under the radar through the victim. We notice that DDoS attacks have features of repeatable patterns which are different from legitimate flash crowd traffics. In this paper, we propose a comparable detection methods based on the Pearson’s correlation coefficient. Our methods can extract the repeatable features from the packet arrivals in the DDoS traffics but not in flash crowd traffics. The extensive simulations were tested for the optimization of the detection methods. We then performed experiments with several datasets and our results affirm that the proposed methods can differentiate DDoS attacks from legitimate traffics.

Identificador

http://hdl.handle.net/10536/DRO/DU:30051387

Idioma(s)

eng

Publicador

Springer New York LLC

Relação

http://dro.deakin.edu.au/eserv/DU:30051387/Thapngam-distributeddenial-2014.pdf

http://dro.deakin.edu.au/eserv/DU:30051387/thapngam-distributeddenial-inpress-2012.pdf

http://dx.doi.org/10.1007/s12083-012-0173-3

Direitos

2012, Springer

Palavras-Chave #anomaly detection #correlation coefficient #DDoS attacks #traffic patterns
Tipo

Journal Article