Detection of DoS and DDoS Attacks in NGMN Using Frequency Domain Analysis

被引:0
|
作者
Hashim, Fazirulhisyam [1 ]
Kibria, M. Rubaiyat [1 ]
Jamalipour, Abbas [1 ]
机构
[1] Univ Sydney, Sydney, NSW 2006, Australia
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring security of the infrastructure against external attacks across network boundaries constitutes one of primary attributes as well as challenges of the next generation mobile network (NGMN). To allay the possibility of such attacks emancipating the NGMN architecture, it is necessary to identify the attack types. However, detection of the attack types from various traffic flows (as is the case in network links) and their subsequent classification can be a very daunting task, especially when both the attack and the legitimate traffic exhibit similar statistical properties (such as denial-of-service (DoS) and distributed DoS (DDoS)). Furthermore, the attacker's ability to spoof and forge the packet header information (including IP address) makes the detection process even more difficult. Conventional anomaly based attack detection mechanisms have been found wanting in such situations. In an attempt to provide a solution, this paper proposes a detection algorithm that identifies and characterizes network traffic by investigating the frequency spectrum distribution. The Lomb periodogram is utilized to determine the power spectrum of the observed traffic whereupon two deviation score parameters are employed to segregate the anomaly traffic flows from legitimate ones in a two-step method. For simplicity purposes, the efficiency of such classification effort is demonstrated for DoS and DDoS attacks only (for their statistical similarity to normal traffic).
引用
收藏
页码:547 / 551
页数:5
相关论文
共 50 条
  • [1] Frequency Characteristics of DoS and DDoS Attacks
    Fouladi, Ramin Fadaei
    Seifpoor, Tina
    Anarim, Emin
    [J]. 2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
  • [2] A detection and recovery architecture against DoS and worm attacks in NGMN
    Hashim, Fazirulhisyam
    Kibria, M. Rubaiyat
    Jamalipour, Abbas
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1675 - 1679
  • [3] Detection of DoS/DDoS attacks: the UBM and GMM approach
    Martinez Osorio, Jorge Steven
    Vergara Tejada, Jaime Alberto
    Botero Vega, Juan Felipe
    [J]. 2021 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2021), 2021, : 866 - 871
  • [4] Detecting DoS and DDoS Attacks by using an Intrusion Detection and Remote Prevention System
    Leu, Fang-Yie
    Li, Zhi-Yang
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 251 - 254
  • [5] Filtering of shrew DDoS attacks in frequency domain
    Chen, Y
    Hwang, K
    Kwok, YK
    [J]. LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 786 - 793
  • [6] Intrusion detection of DoS/DDoS and probing attacks for web services
    Zheng, J
    Hu, MZ
    [J]. ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2005, 3739 : 333 - 344
  • [7] Detection of Low-Rate Cloud DDoS Attacks in Frequency Domain Using Fast Hartley Transform
    Neha Agrawal
    Shashikala Tapaswi
    [J]. Wireless Personal Communications, 2020, 112 : 1735 - 1762
  • [8] Detection of Low-Rate Cloud DDoS Attacks in Frequency Domain Using Fast Hartley Transform
    Agrawal, Neha
    Tapaswi, Shashikala
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (03) : 1735 - 1762
  • [9] Detecting DoS and DDoS Attacks using Chi-Square
    Leu, Fang-Yei
    Pai, Chia-Chi
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 255 - 258
  • [10] Defending Dos/DDOS attacks using network new technology
    Lu, N
    Chen, HX
    Xiao, J
    [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1612 - 1617