Detecting distributed denial of service attack traffic at the agent machines

被引:0
|
作者
Laurens, Vicky [1 ]
El Saddik, Abdulmotaleb [1 ]
Dhar, Pulak [2 ]
Srivastava, Vineet [2 ]
机构
[1] Univ Ottawa, Multimedia Commun Res Lab, Ottawa, ON K1N 6N5, Canada
[2] Cistech Ltd, Ottawa, ON K2E 7V, Canada
关键词
internet security; DDoS; traffic monitoring;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to financial losses caused by Distributed Denial of Service (DDoS) attacks, most defence mechanisms have been deployed at the network where the target server is located. We believe this paradigm should change in order to tackle the DDoS threat in its basis: thwart agent machines participation in DDoS attacks. Our proposal consists of developing an agent to monitor the packet traffic rate (outgoing packets / incoming packets). Our first deployment is based upon characterizing TCP connections; normal TCP connections can be characterized by the ratio of the sent packets to the received packets from a given destination [1]. Preliminary results have shown that the traffic ratio values usually present larger values at the beginning of the run when there are not enough packets to make a decision on whether or not traffic is legitimate. A low value for threshold allows for faster attack detection, but it also increases the number of false-positives.
引用
收藏
页码:2278 / +
页数:2
相关论文
共 50 条
  • [21] Intrusion detection of distributed denial of service attack in cloud
    Velliangiri, S.
    Premalatha, J.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10615 - 10623
  • [22] Characterization and Comparison of Distributed Denial of Service Attack Tools
    Kaur, Harjeet
    Behal, Sunny
    Kumar, Krishan
    [J]. 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1139 - 1145
  • [23] Distributed Denial of Service attack on Cloud: Detection and Prevention
    Khadka, Bikram
    Withana, Chandana
    Alsadoon, Abeer
    Elchouemi, Amr
    [J]. 2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [24] An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment
    Riskhan, Basheer
    Safuan, Halawati Abd Jalil
    Hussain, Khalid
    Elnour, Asma Abbas Hassan
    Abdelmaboud, Abdelzahir
    Khan, Fazlullah
    Kundi, Mahwish
    [J]. SENSORS, 2023, 23 (14)
  • [25] Detecting and Reacting against Distributed Denial of Service Attacks
    Bouzida, Yacine
    Cuppens, Frederic
    Gombault, Sylvain
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2394 - 2399
  • [26] Detecting denial of service attacks using Support Vector Machines
    Mukkamala, S
    Sung, AH
    [J]. PROCEEDINGS OF THE 12TH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1 AND 2, 2003, : 1231 - 1236
  • [27] AN OVERVIEW OF DISTRIBUTED DENIAL OF SERVICE TRAFFIC DETECTION APPROACHES
    Cvitic, Ivan
    Perakovic, Dragan
    Perisa, Marko
    Husnjak, Sinsa
    [J]. PROMET-TRAFFIC & TRANSPORTATION, 2019, 31 (04): : 453 - 464
  • [28] A Novel Model for Distributed Denial of Service Attack Analysis and Interactivity
    Ahmad, Ashraf
    AbuHour, Yousef
    Alghanim, Firas
    [J]. SYMMETRY-BASEL, 2021, 13 (12):
  • [29] Implementation of Honeypot to Detect and Prevent Distributed Denial of Service Attack
    Sembiring, Irwan
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE), 2016, : 345 - 350
  • [30] Modeling Distributed Denial of Service Attack in Advanced Metering Infrastructure
    Guo, Yonghe
    Ten, Chee-Wooi
    Hu, Shiyan
    Weaver, Wayne W.
    [J]. 2015 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2015,