Detection on application layer DDoS using random walk model


Autoria(s): Xu,C; Zhao,G; Xie,G; Yu,S
Contribuinte(s)

[Unknown]

Data(s)

01/01/2014

Resumo

Application Layer Distributed Denial of Service (ALDDoS) attacks have been increasing rapidly with the growth of Botnets and Ubiquitous computing. Differentiate to the former DDoS attacks, ALDDoS attacks cannot be efficiently detected, as attackers always adopt legitimate requests with real IP address, and the traffic has high similarity to legitimate traffic. In spite of that, we think, the attackers' browsing behavior will have great disparity from that of the legitimate users'. In this paper, we put forward a novel user behavior-based method to detect the application layer asymmetric DDoS attack. We introduce an extended random walk model to describe user browsing behavior and establish the legitimate pattern of browsing sequences. For each incoming browser, we observe his page request sequence and predict subsequent page request sequence based on random walk model. The similarity between the predicted and the observed page request sequence is used as a criterion to measure the legality of the user, and then attacker would be detected based on it. Evaluation results based on real collected data set has demonstrated that our method is very effective in detecting asymmetric ALDDoS attacks. © 2014 IEEE.

Identificador

http://hdl.handle.net/10536/DRO/DU:30068065

Idioma(s)

eng

Publicador

IEEE

Relação

http://dro.deakin.edu.au/eserv/DU:30068065/t055750-evid-iccconfandpeerrvwgnrl-2014.pdf

http://dro.deakin.edu.au/eserv/DU:30068065/t055812-xu-c-detectiononapplication-2014.pdf

http://www.dx.doi.org/10.1109/ICC.2014.6883402

Direitos

2014, IEEE

Palavras-Chave #anomaly detection #Asymmetric application layer DDoS attack #random walk model #similarity
Tipo

Conference Paper