Detecting distributed denial of service attack traffic at the agent machines

被引:0
|
作者
Laurens, Vicky [1 ]
El Saddik, Abdulmotaleb [1 ]
Dhar, Pulak [2 ]
Srivastava, Vineet [2 ]
机构
[1] Univ Ottawa, Multimedia Commun Res Lab, Ottawa, ON K1N 6N5, Canada
[2] Cistech Ltd, Ottawa, ON K2E 7V, Canada
关键词
internet security; DDoS; traffic monitoring;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to financial losses caused by Distributed Denial of Service (DDoS) attacks, most defence mechanisms have been deployed at the network where the target server is located. We believe this paradigm should change in order to tackle the DDoS threat in its basis: thwart agent machines participation in DDoS attacks. Our proposal consists of developing an agent to monitor the packet traffic rate (outgoing packets / incoming packets). Our first deployment is based upon characterizing TCP connections; normal TCP connections can be characterized by the ratio of the sent packets to the received packets from a given destination [1]. Preliminary results have shown that the traffic ratio values usually present larger values at the beginning of the run when there are not enough packets to make a decision on whether or not traffic is legitimate. A low value for threshold allows for faster attack detection, but it also increases the number of false-positives.
引用
收藏
页码:2278 / +
页数:2
相关论文
共 50 条
  • [1] Detecting Distributed Denial-of-Service Attack Traffic by Statistical Test
    Chen, Chin-Ling
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1190 - 1194
  • [2] Distributed Denial of Service Attack Prevention at Source Machines
    Misono, Masanori
    Yoshida, Kaito
    Hwang, Juho
    Shinagawa, Takahiro
    [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 488 - 495
  • [3] Modeling and simulation for detecting a distributed denial of service attack
    Seo, HS
    Cho, HT
    [J]. AL 2002: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2002, 2557 : 179 - 190
  • [4] Detecting Distributed Denial of Service in Network Traffic with Deep Learning
    Rusyaidi, Muhammad
    Jaf, Sardar
    Ibrahim, Zunaidi
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 34 - 41
  • [5] A survey of Distributed Denial of Service attack
    Mallikarjunan, K. Narasimha
    Muthupriya, K.
    Shalinie, S. Mercy
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [6] Massive distributed denial of service attack
    不详
    [J]. COMPUTERS & SECURITY, 2003, 22 (06) : 465 - 465
  • [7] Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion
    Cheng, Jieren
    Yin, Jianping
    Liu, Yun
    Cai, Zhiping
    Wu, Chengkun
    [J]. SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 132 - 139
  • [8] Curbing Distributed Denial of Service Attack by Traffic Filtering in Wireless Sensor Network
    Sahu, Sonali Swetapadma
    Priyadarshini, Pooja
    Bilgaiyan, Saurabh
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [9] Formalized Description of Distributed Denial of Service Attack
    杜彦辉
    马锐
    刘玉树
    [J]. Journal of Beijing Institute of Technology, 2004, (04) : 360 - 364
  • [10] Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm
    Ramzan, Mahrukh
    Shoaib, Muhammad
    Altaf, Ayesha
    Arshad, Shazia
    Iqbal, Faiza
    Castilla, Angel Kuc
    Ashraf, Imran
    [J]. SENSORS, 2023, 23 (20)