SEDP-based detection of low-rate DoS attacks

被引:11
|
作者
Wu, Zhijun [1 ]
Yue, Meng [1 ]
Li, Douzhe [1 ]
Xie, Ke [1 ]
机构
[1] Civil Aviat Univ China, Tianjin Key Lab Adv Signal Proc, Tianjin 300300, Peoples R China
关键词
low-rate denial of service attack; Fourier transform; detection; energy distribution; hypothesis testing; SERVICE; SYSTEMS;
D O I
10.1002/dac.2783
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Low-rate Denial of Service (LDoS) is a new type of TCP-targeted attacks, which attempt to deny bandwidth to TCP flows while sending at sufficiently low-average rate to elude detection of DoS defense system. Therefore, LDoS attacks are difficult to be detected by routers and counter-DoS mechanisms. In this paper, an approach of detecting LDoS attacks is proposed by using the technology of signal processing based on the model of spectral energy distribution probability. The proposed approach calculates variances between the incoming traffic of normal TCP and attack flows to a server by using packet sampling sequence within a certain period. The network traffic is converted from the time domain to the frequency domain forming a spectral signal, and the distribution probability of spectral energy is estimated based on spectrum characteristics of rectangular pulses. This approach explores that the energy of LDoS attacks is mostly distributed in the main lobe width while that of normal TCP traffic is just concentrated near zero in frequency domain. Both the spectral energy of normal TCP traffic and LDoS attacks distributed in main lobe are calculated, and an energy threshold is set as decision value based on statistical results according to energy distribution properties. The existence of LDoS attacks is determined and detected by comparing calculated variances with the preset decision threshold value. Tests on the detection performance of the proposed approach were performed in NS-2 simulation environment, and detection rate was obtained by Hypothesis test. Experiment results show that the proposed approach has higher detection accuracy and less computation consuming. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1772 / 1788
页数:17
相关论文
共 50 条
  • [1] Low-Rate DoS Attacks Detection Based on Network Multifractal
    Wu, Zhijun
    Zhang, Liyuan
    Yue, Meng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (05) : 559 - 567
  • [2] Coherent Detection of Synchronous Low-Rate DoS Attacks
    Wu, Zhijun
    Yin, Yue
    Li, Guang
    Yue, Meng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [3] Low-Rate DoS Attacks Detection Based on MAF-ADM
    Zhan, Sijia
    Tang, Dan
    Man, Jianping
    Dai, Rui
    Wang, Xiyin
    [J]. SENSORS, 2020, 20 (01)
  • [4] The detection of low-rate DoS attacks using the SADBSCAN algorithm
    Tang, Dan
    Zhang, Siqi
    Chen, Jingwen
    Wang, Xiyin
    [J]. INFORMATION SCIENCES, 2021, 565 : 229 - 247
  • [5] Power spectrum entropy based detection and mitigation of low-rate DoS attacks
    Chen, Zhaomin
    Yeo, Chai Kiat
    Lee, Bu Sung
    Lau, Chiew Tong
    [J]. COMPUTER NETWORKS, 2018, 136 : 80 - 94
  • [6] Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey
    Wu Zhijun
    Li Wenjing
    Liu Liang
    Yue Meng
    [J]. IEEE ACCESS, 2020, 8 : 43920 - 43943
  • [7] A Low-Rate DoS Detection Based on Rate Anomalies
    Wu, Libing
    Cheng, Jing
    He, Yanxiang
    Xu, Ao
    Wen, Peng
    [J]. APPLIED INFORMATICS AND COMMUNICATION, PT III, 2011, 226 : 189 - +
  • [8] A Low-rate DoS Detection Based on Rate Anomalies
    Wu, Libing
    Cheng, Jing
    He, Yanxiang
    Xu, Ao
    Wen, Peng
    [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL III, 2010, : 89 - 92
  • [9] A comparative study on flood DoS and low-rate DoS attacks
    Liu, Xiao-Ming
    Cheng, Gong
    Li, Qi
    Zhang, Miao
    [J]. Journal of China Universities of Posts and Telecommunications, 2012, 19 (SUPPL. 1): : 116 - 121
  • [10] An On-Line Intrusion Detection Approach to Identify Low-Rate DoS Attacks
    Aiello, M.
    Cambiaso, E.
    Mongelli, M.
    Papaleo, G.
    [J]. 2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,