System for DDoS attack mitigation by discovering the attack vectors through statistical traffic analysis

被引:3
|
作者
Mirchev M.J. [1 ]
Mirtchev S.T. [1 ]
机构
[1] Faculty of Telecommunications, Technical University of Sofia, 8 Kl.Ohridski Blvd, Sofia
关键词
DDoS attack; Distributed denial-of-service; IP network security; Statistical analysis; Vector of attack;
D O I
10.1504/IJICS.2020.109479
中图分类号
学科分类号
摘要
DDoS attacks are becoming an increasing threat to the internet due to the easy availability of user-friendly attack tools. In meantime defending from such attacks is very difficult, because it is very hard to differentiate between the legitimate traffic and attack traffic and also maintain the attacked service still accessible while under attack. This paper describes a method for discovering the vector of a DDoS attack using statistical traffic analysis. The discussed methods are based on having a notification of the attack and making a statistical analysis of the attack traffic to find the vector and profiling a statistical baseline of normal traffic and discovering the abnormal traffic as a difference in the statistical parameters of TCP/IP packets in a given moment to the baseline and thus making a decision of the attack and its vector simultaneously. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:309 / 321
页数:12
相关论文
共 50 条
  • [1] Statistical Application Fingerprinting for DDoS Attack Mitigation
    Ahmed, Muhammad Ejaz
    Ullah, Saeed
    Kim, Hyoungshick
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) : 1471 - 1484
  • [2] DDoS in SDN: a review of open datasets, attack vectors and mitigation strategies
    Hill, Winston
    Acquaah, Yaa Takyiwaa
    Mason, Janelle
    Limbrick, Daniel
    Teixeira-Poit, Stephanie
    Coates, Carla
    Roy, Kaushik
    DISCOVER APPLIED SCIENCES, 2024, 6 (09)
  • [3] A TRAFFIC COHERENCE ANALYSIS MODEL FOR DDOS ATTACK DETECTION
    Rahmani, Hamza
    Sahli, Nabil
    Kammoun, Farouk
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 148 - 154
  • [4] Adaptive tuning of network traffic policing mechanisms for DDoS attack mitigation systems
    Karpowicz, Michal P.
    EUROPEAN JOURNAL OF CONTROL, 2021, 61 : 101 - 118
  • [5] DDoS SourceTracer: An Intelligent Application for DDoS Attack Mitigation in SDN
    Aslam, Naziya
    Srivastava, Shashank
    Gore, M. M.
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 117
  • [6] A DDoS Attack Mitigation Framework for Internet of Things
    Adat, Vipindev
    Gupta, B. B.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 2036 - 2041
  • [7] Empowering DDoS Attack Mitigation with Programmable Switches
    Chen, Xiang
    Liu, Hongyan
    Zhang, Dong
    Huang, Qun
    Zhou, Haifeng
    Wu, Chunming
    Yang, Qiang
    IEEE NETWORK, 2023, 37 (03): : 112 - 117
  • [8] Traffic Anomaly Detection in DDos Flooding Attack
    Purwanto, Yudha
    Hendrawan, Kuspriyanto
    Rahardjo, Budi
    2014 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2014,
  • [9] DDoS attack mitigation through Root-DNS server : A case study
    Saridou, Betty
    Shiaeles, Stavros
    Papadopoulos, Basil
    2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 60 - 65
  • [10] DDoS Attack Mitigation Through Control of Inherent Charge Decay of Memory Implementations
    Herbert, Alan
    Irwin, Barry
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 126 - 134