Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics

被引:33
|
作者
Kulkarni, Amit
Bush, Stephen [1 ]
机构
[1] Rensselaer Polytech Inst, New York, NY USA
[2] Gen Elect Global Res Ctr, Niskayuna, NY USA
关键词
Kolmogorov complexity; denial-of-service attack; active network; entropy; complexity probes;
D O I
10.1007/s10922-005-9016-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes an approach to detecting distributed denial of service (DDoS) attacks that is based on fundamentals of Information Theory, specifically Kolmogorov Complexity. A theorem derived using principles of Kolmogorov Complexity states that the joint complexity measure of random strings is lower than the sum of the complexities of the individual strings when the strings exhibit some correlation. Furthermore, the joint complexity measure varies inversely with the amount of correlation. We propose a distributed active network-based algorithm that exploits this property to correlate arbitrary traffic flows in the network to detect possible denial-of-service attacks. One of the strengths of this algorithm is that it does not require special filtering rules and hence it can be used to detect any type of DDoS attack. We implement and investigate the performance of the algorithm in an active network. Our results show that DDoS attacks can be detected in a manner that is not sensitive to legitimate background traffic.
引用
收藏
页码:69 / 80
页数:12
相关论文
共 50 条
  • [11] Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically
    Ohsita, Y
    Ata, S
    Murata, M
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2043 - 2049
  • [12] Effective metric for detecting distributed denial-of-service attacks based on information divergence
    Li, K.
    Zhou, W.
    Yu, S.
    IET COMMUNICATIONS, 2009, 3 (12) : 1851 - 1860
  • [13] Detecting denial-of-service attacks with incomplete audit data
    Patcha, A
    Park, JM
    ICCCN 2005: 14th International Conference on Computer Communications and Networks, Proceedings, 2005, : 263 - 268
  • [14] Denial-of-service attacks
    Neumann, PG
    COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 136 - 136
  • [15] Using adaptive router throttles against distributed denial-of-service attacks
    Liang, Feng
    Yau, David
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (07): : 1220 - 1227
  • [16] Harnessing the power of BitTorrent for distributed denial-of-service attacks
    Wu, Lei
    Harrington, Jerome
    Kuwanoe, Corey
    Zou, Cliff C.
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (08) : 860 - 870
  • [17] Analysis of denial-of-service attacks on denial-of-service defensive measures
    Wang, BT
    Schulzrinne, H
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1339 - 1343
  • [18] Adaptive Response System for Distributed Denial-of-Service Attacks
    Thing, Vrizlynn L. L.
    Sloman, Morris
    Dulay, Naranker
    2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009) VOLS 1 AND 2, 2009, : 809 - 814
  • [19] Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals
    Luo, Xiapu
    Chan, Edmond W. W.
    Chang, Rocky K. C.
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
  • [20] Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals
    Xiapu Luo
    Edmond W. W. Chan
    Rocky K. C. Chang
    EURASIP Journal on Advances in Signal Processing, 2009