Real-time method for DDoS attacks detection based on self-similarity and wavelet analysis

被引:0
|
作者
Ren Xunyi [1 ]
Wang Ruchuan [1 ,2 ]
Qi Zhenghua [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210093, Peoples R China
关键词
DDoS (Distributed denial of service); self-similarity; wavelet analysis; real-time detection; Hurst parameter;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
`rraditional wavelet methods are not efficient to detect the real-time traffic anomaly. To address this drawback, on the basis of self-similarity and wavelet analysis, this paper proposes one real-time method for DDoS attacks detection. Firstly, to effectively analyze new network state, we extracted data packets from network monitor in backward time direction. Secondly, for reducing admissible computing time, we applied time scale self-adjust according to last packets arrival speed. Finally, we adopted three parallel computing strategies to improve real-time performance. Experimental results show that proposed method can quickly and accurately detect DDoS attacks.
引用
收藏
页码:90 / 94
页数:5
相关论文
共 50 条
  • [1] Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarity
    Xia, Zhengmin
    Lu, Songnian
    Li, Jianhua
    Ma, Jin
    [J]. WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 383 - +
  • [2] Real-time Estimation of Traffic Self-similarity Parameter in Simulink with Wavelet Transform
    Grab, E.
    Sarkovskis, S.
    [J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2013, 19 (03) : 88 - 91
  • [3] Analysis of Real-Time Multimedia Traffic in the Context of Self-Similarity
    Joarder, Rajibul Alam
    Parveen, S.
    Sarwar, H.
    Sanyal, S. K.
    Rafique, S.
    [J]. PROCEEDINGS OF ICECE 2008, VOLS 1 AND 2, 2008, : 618 - +
  • [4] Real-Time Detection of DDoS Attacks Based on Random Forest in SDN
    Ma, Ruikui
    Wang, Qiuqian
    Bu, Xiangxi
    Chen, Xuebin
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (13):
  • [5] A fast self-similarity matrix-based method for shrew DDoS attack detection
    Boro, Debojit
    Haloi, Mrinmoy
    Bhattacharyya, Dhruba K.
    [J]. INFORMATION SECURITY JOURNAL, 2020, 29 (02): : 73 - 90
  • [6] On the nature and impact of self-similarity in real-time systems
    Hernandez-Orallo, Enrique
    Vila-Carbo, Joan
    [J]. REAL-TIME SYSTEMS, 2012, 48 (03) : 294 - 319
  • [7] On the nature and impact of self-similarity in real-time systems
    Enrique Hernández-Orallo
    Joan Vila-Carbó
    [J]. Real-Time Systems, 2012, 48 : 294 - 319
  • [8] Self-similarity based DDoS attack detection using Hurst parameter
    Deka, Rup K.
    Bhattacharyya, Dhruba K.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4468 - 4481
  • [9] Detect and Identify DDoS Attacks from Flash Crowd Based on Self-similarity and Renyi Entropy
    Yan, Ruoyu
    Xu, Guoyu
    Qin, XueJing
    [J]. 2017 CHINESE AUTOMATION CONGRESS (CAC), 2017, : 7188 - 7194
  • [10] Detecting DDOS attack based on network self-similarity
    Xiang, Y
    Lin, Y
    Lei, WL
    Huang, SJ
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2004, 151 (03): : 292 - 295