Detection and defense of application-layer DDoS attacks in backbone web traffic


Autoria(s): Zhou,W; Jia,W; Wen,S; Xiang,Y; Zhou,W
Data(s)

01/09/2014

Resumo

Web servers are usually located in a well-organized data center where these servers connect with the outside Internet directly through backbones. Meanwhile, the application-layer distributed denials of service (AL-DDoS) attacks are critical threats to the Internet, particularly to those business web servers. Currently, there are some methods designed to handle the AL-DDoS attacks, but most of them cannot be used in heavy backbones. In this paper, we propose a new method to detect AL-DDoS attacks. Our work distinguishes itself from previous methods by considering AL-DDoS attack detection in heavy backbone traffic. Besides, the detection of AL-DDoS attacks is easily misled by flash crowd traffic. In order to overcome this problem, our proposed method constructs a Real-time Frequency Vector (RFV) and real-timely characterizes the traffic as a set of models. By examining the entropy of AL-DDoS attacks and flash crowds, these models can be used to recognize the real AL-DDoS attacks. We integrate the above detection principles into a modularized defense architecture, which consists of a head-end sensor, a detection module and a traffic filter. With a swift AL-DDoS detection speed, the filter is capable of letting the legitimate requests through but the attack traffic is stopped. In the experiment, we adopt certain episodes of real traffic from Sina and Taobao to evaluate our AL-DDoS detection method and architecture. Compared with previous methods, the results show that our approach is very effective in defending AL-DDoS attacks at backbones. © 2013 Elsevier B.V. All rights reserved.

Identificador

http://hdl.handle.net/10536/DRO/DU:30072041

Idioma(s)

eng

Publicador

Elsevier BV

Relação

http://dro.deakin.edu.au/eserv/DU:30072041/zhou-detectionanddefense-2014.pdf

http://www.dx.doi.org/10.1016/j.future.2013.08.002

http://www.dx.doi.org/10.1016/j.future.2013.08.002

Direitos

2014, Elsevier BV

Palavras-Chave #Backbone #DDoS attack #Model mining #Science & Technology #Technology #Computer Science, Theory & Methods #Computer Science #ANOMALY DETECTION
Tipo

Journal Article