D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events

被引:62
|
作者
Behal, Sunny [1 ]
Kumar, Krishan [2 ]
Sachdeva, Monika [3 ]
机构
[1] IKG Punjab Tech Univ, Kapurthala, Punjab, India
[2] Panjab Univ, UIET, Dept IT, Chandigarh, India
[3] IKG Punjab Tech Univ, Dept CSE, Kapurthala, Punjab, India
关键词
Network security; DDoS attacks; Flash events; Entropy; Information distance; ENTROPY; SYSTEM;
D O I
10.1016/j.jnca.2018.03.024
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the present computer era, though the Internet-based applications are the driving force of social evolution, yet its architectural vulnerabilities proffer plethoric leisure to the attackers for conquering diversity of attacks on its services. Distributed Denial of Service (DDoS) is one of such prominent attack that constitutes a lethal threat to Internet domain that harnesses its computing and communication resources. Despite the presence of enormous defense solutions, ensuring the security and availability of data, resources, and services to end users remains an ongoing research challenge. In addition, the increase in network traffic rates of legitimate traffic and flow similarity of attack traffic with legitimate traffic has further made DDoS problem more crucial. The current research has deployed DDoS defense solutions primarily at the victim-end because of the inherent advantages of easy deployment and availability of complete attack information. However, the huge network traffic volume generated by DDoS attacks and lack of sufficient computational resources at the victim-end makes defense solution itself vulnerable to these attacks. This paper proposes an ISP level distributed, flexible, automated, and collaborative (D-FACE) defense system which not only distributes the computational and storage complexity to the nearest point of presence (PoPs) routers but also leads to an early detection of DDoS attacks and flash events (FEs). The results show that D-FACE defense system outperformed the existing Entropy-based systems on various defense system evaluation metrics.
引用
收藏
页码:49 / 63
页数:15
相关论文
共 50 条
  • [31] Neural Network-Based Approach for Detection and Mitigation of DDoS Attacks in SDN Environments
    Hannache, Oussama
    Batouche, Mohamed Chaouki
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (03) : 50 - 71
  • [32] An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
    Almalawi, Abdulmohsen
    Yu, Xinghuo
    Tari, Zahir
    Fahad, Adil
    Khalil, Ibrahim
    COMPUTERS & SECURITY, 2014, 46 : 94 - 110
  • [33] An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection
    Xu, Jinghui
    Wen, Yu
    Yang, Chun
    Meng, Dan
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1680 - 1687
  • [34] Detection and Mitigation of DoS and DDoS Attacks in IoT-Based Stateful SDN: An Experimental Approach
    Galeano-Brajones, Jesus
    Carmona-Murillo, Javier
    Valenzuela-Valdes, Juan F.
    Luna-Valero, Francisco
    SENSORS, 2020, 20 (03)
  • [35] Space anomaly events detection approach based on generative adversarial nets
    Zhang K.
    Cai Y.
    Ren Y.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2019, 45 (07): : 1329 - 1336
  • [36] A distributed approach to network anomaly detection based on independent component analysis
    Palmieri, Francesco
    Fiore, Ugo
    Castiglione, Aniello
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1113 - 1129
  • [37] Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives
    Javaheri, Danial
    Gorgin, Saeid
    Lee, Jeong-A
    Masdari, Mohammad
    INFORMATION SCIENCES, 2023, 626 : 315 - 338
  • [38] Kafka-Shield: Kafka Streams-based distributed detection scheme for IoT traffic-based DDoS attacks
    Shukla, Praveen
    Krishna, C. Rama
    Patil, Nilesh Vishwasrao
    SECURITY AND PRIVACY, 2024, 7 (06):
  • [39] A Novel Anomaly Detection Approach for Mitigating Web-based Attacks against Clouds
    Zhang, Simin
    Li, Bo
    Li, Jianxin
    Zhang, Mingming
    Chen, Yang
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 289 - 294
  • [40] Cyber-Secure SDN: A CNN-Based Approach for Efficient Detection and Mitigation of DDoS attacks
    Najar, Ashfaq Ahmad
    Naik, S. Manohar
    COMPUTERS & SECURITY, 2024, 139