An adaptive sampling algorithm with applications to denial-of-service attack detection

被引:4
|
作者
Patcha, Anitnesh [1 ]
Park, Jung-Min [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
D O I
10.1109/ICCCN.2006.286238
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
There is an emerging need for the traffic processing capability of network security mechanisms, such as intrusion detection systems (IDS), to match the high throughput of today's high-bandwidth networks. Recent research has shown that the vast majority of security solutions deployed today are inadequate for processing traffic at a sufficiently high rate to keep pace with the network's bandwidth. To alleviate this problem, packet sampling schemes at the front end of network monitoring systems (such as an IDS) have been proposed. However, existing sampling algorithms are poorly suited for this task especially because they are unable to adapt to the trends in network traffic. Satisfying such a criterion requires a sampling algorithm to be capable of controlling its sampling rate to provide sufficient accuracy at minimal overhead. To meet this utopian goal, adaptive sampling algorithms have been proposed. In this paper, we put forth an adaptive sampling algorithm based on weighted least squares prediction. The proposed sampling algorithm is tailored to enhance the capability of network based IDS at detecting denial-of-service (DoS) attacks. Not only does the algorithm adaptively reduce the volume of data that would be analyzed by an IDS, but it also maintains the intrinsic self-similar characteristic of network traffic. The latter characteristic of the algorithm can be used by an IDS to detect DoS attacks by using the fact that a change in the self-similarity of network traffic is a known indicator of a DoS attack.
引用
收藏
页码:11 / +
页数:3
相关论文
共 50 条
  • [1] An adaptive observer design for denial-of-service attack detection in platoon
    Zhang, Xiaofei
    Du, Haiping
    Jia, Zhijuan
    Cui, Chi
    Cheng, Yage
    Yan, Yan
    [J]. OPTIMAL CONTROL APPLICATIONS & METHODS, 2023, 44 (04): : 2148 - 2165
  • [2] Denial-of-Service Attack Detection System
    Thakare, Supriya S.
    Kaur, Parminder
    [J]. 2017 1ST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND INFORMATION MANAGEMENT (ICISIM), 2017, : 281 - 285
  • [3] Denial-of-service attack-detection techniques
    Carl, G
    Kesidis, G
    Brooks, RR
    Rai, S
    [J]. IEEE INTERNET COMPUTING, 2006, 10 (01) : 82 - 89
  • [4] Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
    Tan, Zhiyuan
    Jamdagni, Aruna
    He, Xiangjian
    Nanda, Priyadarsi
    Liu, Ren Ping
    [J]. NEURAL INFORMATION PROCESSING, PT III, 2011, 7064 : 756 - +
  • [5] A detection scheme against Distributed Reflector Denial-of-Service attack
    Kim, YS
    Jeon, JC
    Jeon, JW
    Yoo, KY
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 44 - 48
  • [6] Intrusion Detection Systems' Performance for Distributed Denial-of-Service Attack
    de Sousa Araujo, Tiago Emilio
    Matos, Fernando Menezes
    Moreira, Josilene Aires
    [J]. 2017 CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (CHILECON), 2017,
  • [7] Denial-of-Service Attack Detection over IPv6 Network Based on KNN Algorithm
    Alharbi, Yasser
    Alferaidi, Ali
    Yadav, Kusum
    Dhiman, Gaurav
    Kautish, Sandeep
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [8] Detection of Denial-of-service Attacks
    Anh Quang Tran
    [J]. 计算机工程, 2002, (S1) : 86 - 91
  • [9] Lightweight models for detection of denial-of-service attack in wireless sensor networks
    Abidoye, Ademola P.
    Kabaso, Boniface
    [J]. IET NETWORKS, 2021, 10 (04) : 185 - 199
  • [10] Denial-of-Service attack Possibilities on NFC Technology
    Fahrianto, Feri
    Lubis, Muhammad Fadil
    Fiade, Andrew
    [J]. 2016 4TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT, 2016, : 228 - 232