Discriminating DDoS Flows from Flash Crowds Using Information Distance

被引:0
|
作者
Yu, Shui [1 ]
Thapngam, Theerasak [1 ]
Liu, Jianwen [1 ]
Wei, Su [1 ]
Zhou, Wanlei [1 ]
机构
[1] Deakin Univ, Burwood, Vic 3125, Australia
关键词
DDoS Attack; Distance; Measurement; ATTACKS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Discriminating DDoS flooding attacks from flash crowds poses a tough challenge for the network security community. Because of the vulnerability of the original design of the Internet, attackers can easily mimic the patterns of legitimate network traffic to fly under the radar. The existing fingerprint or feature based algorithms are incapable to detect new attack strategies. In this paper, we aim to differentiate DDoS attack flows from flash crowds. We are motivated by the following fact: the attack flows are generated by the same pre-built program (attack tools), however, flash crowds come from randomly distributed users all over the Internet. Therefore, the flow similarity among DDoS attack flows is much stronger than that among flash crowds. We employ abstract distance metrics, the Jeffrey distance, the Sibson distance, and the Hellinger distance to measure the similarity among flows to achieve our goal. We compared the three metrics and found that the Sibson distance is the most suitable one for our purpose. We apply our algorithm to the real datasets and the results indicate that the proposed algorithm can differentiate them with an accuracy around 65%.
引用
收藏
页码:351 / 356
页数:6
相关论文
共 50 条
  • [21] MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks
    Jeyanthi, N.
    Sriman, N. Ch.
    Iyengar, Narayana
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2011, 11 (04) : 41 - 52
  • [22] Detection of DDoS attacks and flash events using information theory metrics-An empirical investigation
    Behal, Sunny
    Kumar, Krishan
    [J]. COMPUTER COMMUNICATIONS, 2017, 103 : 18 - 28
  • [23] Information Elicitation from Rowdy Crowds
    Schoenebeck, Grant
    Yu, Fang-Yi
    Zhang, Yichi
    [J]. PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), 2021, : 3974 - 3986
  • [24] Discriminating Unknown Software Using Distance Model
    Lemmou, Yassine
    Le-Bouder, Helene
    Lanet, Jean-Louis
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS 2019), 2019, : 9 - 14
  • [25] DISTANCE, INFORMATION FLOWS, AND MODERNIZATION - SOME OBSERVATIONS FROM WEST MALAYSIA
    LEINBACH, TR
    [J]. PROFESSIONAL GEOGRAPHER, 1973, 25 (01): : 7 - 11
  • [26] Methods of distinguishing flash crowds from spoofed DoS attacks
    Le, Quyen
    Zhanikeev, Marat
    Tanaka, Yoshiaki
    [J]. 2007 NEXT GENERATION INTERNET NETWORKS, 2007, : 167 - +
  • [27] Protecting Information Systems from DDoS Attack Using Multicore Methodology
    Chonka, Ashley
    Zhou, Wanlei
    Knapp, Keith
    Xiang, Yang
    [J]. 8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 270 - +
  • [28] A comprehensive approach to discriminate DDoS attacks from flash events
    Sachdeva, Monika
    Kumar, Krishan
    Singh, Gurvinder
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 26 : 8 - 22
  • [29] DDoS detection and discrimination from flash events: a compendious review
    Dhingra, Avneet
    Sachdeva, Monika
    [J]. 2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 518 - 524
  • [30] Distinguishing Flooding Distributed Denial of Service from Flash Crowds Using Four Data Mining Approaches
    Kong, Bin
    Yang, Kun
    Sun, Degang
    Li, Meimei
    Shi, Zhixin
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2017, 14 (03) : 839 - 856