Router Based Detection for Low-Rate Agents of DDoS Attack

被引:0
|
作者
Nashat, Dalia [1 ]
Jiang, Xiaohong [1 ]
Horiguchi, Susumu [1 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 980, Japan
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The TCP SYN flooding attack is the most prevalent type of DDoS attacks that exhaust network resources. The current detection schemes only work well for the detection of high-rate flooding sources. It is notable, however, that in the current DDoS attacks, the flooding rate is usually distributed among many low-rate flooding agents to make the detection more difficult. Therefore, a more sensitive and fast detection scheme is highly desirable for the efficient detection of these low-rate flooding sources. In this paper, we focus on the low-rate agent and propose a router-based detection scheme for it. The proposed scheme is based on the TCP SYN-SYN/ACK protocol pair with the consideration of packet header information (both sequence and Ack. numbers). To make our scheme more sensitive and generally applicable, the Counting Bloom Filter is used to avoid the effect of SMACK retransmission and the Change Point Detection method is applied to avoid the dependence of detection on sites and access patterns. Extensive trace-driven simulation has been conducted to demonstrate the efficiency of the proposed scheme in terms of its detection probability and also average detection time.
引用
收藏
页码:83 / 88
页数:6
相关论文
共 50 条
  • [21] Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment
    Li, Zhi
    Jin, Hai
    Zou, Deqing
    Yuan, Bin
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2020, 31 (03) : 695 - 706
  • [22] A Collaborative Detection and IP Traceback Algorithm for Low-rate DDos Attacks
    Gui, Bingxiang
    Zhou, Wanlei
    Zhou, Kang
    4TH INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES (ICMEAT 2015), 2015, : 546 - 549
  • [23] Low-rate DoS Attack Detection Based on WPD-EE Algorithm
    Wang, Xiaocai
    Yang, Qiuwei
    Xie, Zichao
    Zheng, Zhiqing
    Yan, Yudong
    Tang, Dan
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 384 - 391
  • [24] A Low-rate DoS Attack Detection Method Based on Hilbert Spectrum and Correlation
    Tang, Dan
    Wu, Xiaoxue
    Tang, Liu
    Man, Jianping
    Zhan, Sijia
    Liu, Qin
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 1358 - 1363
  • [25] On a Mathematical Model for Low-Rate Shrew DDoS
    Luo, Jingtang
    Yang, Xiaolong
    Wang, Jin
    Xu, Jie
    Sun, Jian
    Long, Keping
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (07) : 1069 - 1083
  • [26] Modeling of Low-Rate DDoS-Attacks
    Tarasov, Yaroslav
    Pakulova, Ekaterina
    Basov, Oleg
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [27] AE-CIAM: a hybrid AI-enabled framework for low-rate DDoS attack detection in cloud computing
    Najar, Ashfaq Ahmad
    Manohar Naik, S.
    Cluster Computing, 2025, 28 (02)
  • [28] Two-Layer Approach for Mixed High-Rate and Low-Rate Distributed Denial of Service (DDoS) Attack Detection and Filtering
    Toklu, S.
    Simsek, M.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 7923 - 7931
  • [29] Two-Layer Approach for Mixed High-Rate and Low-Rate Distributed Denial of Service (DDoS) Attack Detection and Filtering
    S. Toklu
    M. Şimşek
    Arabian Journal for Science and Engineering, 2018, 43 : 7923 - 7931
  • [30] Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
    Xiang, Yang
    Li, Ke
    Zhou, Wanlei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) : 426 - 437