Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics

被引:33
|
作者
Kulkarni, Amit
Bush, Stephen [1 ]
机构
[1] Rensselaer Polytech Inst, New York, NY USA
[2] Gen Elect Global Res Ctr, Niskayuna, NY USA
关键词
Kolmogorov complexity; denial-of-service attack; active network; entropy; complexity probes;
D O I
10.1007/s10922-005-9016-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes an approach to detecting distributed denial of service (DDoS) attacks that is based on fundamentals of Information Theory, specifically Kolmogorov Complexity. A theorem derived using principles of Kolmogorov Complexity states that the joint complexity measure of random strings is lower than the sum of the complexities of the individual strings when the strings exhibit some correlation. Furthermore, the joint complexity measure varies inversely with the amount of correlation. We propose a distributed active network-based algorithm that exploits this property to correlate arbitrary traffic flows in the network to detect possible denial-of-service attacks. One of the strengths of this algorithm is that it does not require special filtering rules and hence it can be used to detect any type of DDoS attack. We implement and investigate the performance of the algorithm in an active network. Our results show that DDoS attacks can be detected in a manner that is not sensitive to legitimate background traffic.
引用
收藏
页码:69 / 80
页数:12
相关论文
共 50 条
  • [1] Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics
    Amit Kulkarni
    Stephen Bush
    Journal of Network and Systems Management, 2006, 14 : 69 - 80
  • [2] Detecting Denial-of-Service Attacks Using sFlow
    Hublikar, Shivaraj
    Eligar, Vijaya
    Kakhandki, Arun
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 483 - 491
  • [3] Detecting Denial-of-Service attacks using the wavelet transform
    Hamdi, Mohamed
    Boudriga, Noureddine
    COMPUTER COMMUNICATIONS, 2007, 30 (16) : 3203 - 3213
  • [4] Handling Distributed Denial-of-Service Attacks
    Janczewski, Lech J.
    Information Security Technical Report, 2001, 6 (03): : 37 - 44
  • [5] An analysis of using reflectors for distributed denial-of-service attacks
    Paxson, V
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (03) : 38 - 47
  • [6] Distributed defense against distributed denial-of-service attacks
    Shi, W
    Xiang, Y
    Zhou, WL
    DISTRIBUTED AND PARALLEL COMPUTING, 2005, 3719 : 357 - 362
  • [7] Sophistication in distributed denial-of-service attacks on the Internet
    Kumar, VA
    CURRENT SCIENCE, 2004, 87 (07): : 885 - 888
  • [8] Design and Development of Proactive Models for Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks
    Nagesh, H. R.
    Sekaran, K. Chandra
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 168 - 176
  • [9] On the Move: Evading Distributed Denial-of-Service Attacks
    Stavrou, Angelos
    Fleck, Daniel
    Kolias, Constantinos
    COMPUTER, 2016, 49 (03) : 104 - 107
  • [10] Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically
    Ohsita, Yuichi
    Ata, Shingo
    Murata, Masayuki
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2006, E89B (10) : 2868 - 2877