Spatial Correlation Detection of DDoS Attack

被引:0
|
作者
Li, Zonglin [1 ]
Hu, Guangming [1 ]
Yao, Xingmiao [1 ]
机构
[1] Univ Elect Sci & Technol China, Key Lab Broadband Opt Fiber Transmiss & Commun Ne, Chengdu, Peoples R China
关键词
D O I
10.1109/ICCCAS.2009.5250511
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
DDoS attack flows distributed in many links exhibit directional nature, they are usually generated by certain tools and originate from different nodes, but have inherent dependencies in spatial when transit in network. This will cause correlation between the traffic where they traverse deviate from norm. By taking advantage of this feature, we propose a spatial correlation detection method deploying in backbone network to combat DDoS attack. In doing so, we first approximately estimate abnormality of every origin destination (OD) flow through comparing observations with predictions, then for OD flows with same destination, extracting spatial correlation between their abnormality estimations by principle component analysis(PCA). Abrupt change of spatial correlation indicates DDoS attack occurs. We evaluate the detection performance of our method in detecting synthetic DDoS attack that injected on real backbone traffic through receiver operating characteristic (ROC) curve. The contribution of this paper is utilizing spatial correlation between attack flows, rather than the volume of attack purely, facilitates us to detect relatively small attack being masked in tremendous traffic of backbone network. Moreover, contrary to the centralized computation of previous network-wide anomaly detection method, our method can be deployed separately in each node, in such a way that our method can adapt to different size of network, and thus scalable.
引用
收藏
页码:304 / 308
页数:5
相关论文
共 50 条
  • [1] Global abnormal correlation analysis for DDoS attack detection
    Li, Zong-Lin
    Hu, Guang-Min
    Yang, Dan
    [J]. 2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 168 - 173
  • [2] DDoS Attack Detection and Wavelets
    Lan Li
    Gyungho Lee
    [J]. Telecommunication Systems, 2005, 28 : 435 - 451
  • [3] DDoS attack detection and wavelets
    Li, L
    Lee, G
    [J]. ICCCN 2003: 12TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2003, : 421 - 427
  • [4] DDoS attack detection and wavelets
    Li, L
    Lee, GG
    [J]. TELECOMMUNICATION SYSTEMS, 2005, 28 (3-4) : 435 - 451
  • [5] Correlation-Aware Neural Networks for DDoS Attack Detection in IoT Systems
    Hekmati, Arvin
    Zhang, Jiahe
    Sarkar, Tamoghna
    Jethwa, Nishant
    Grippo, Eugenio
    Krishnamachari, Bhaskar
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2024,
  • [6] Proactive DDoS Attack Detection and Isolation
    Kansal, Vaishali
    Dave, Mayank
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 334 - 338
  • [7] Detection and analysis types of DDoS attack
    Navruzov, Erkin
    Kabulov, Anvar
    [J]. 2022 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2022, : 203 - 209
  • [8] DeepDDoS: Online DDoS Attack Detection
    Shi, Zhenping
    Li, Jie
    Wu, Chentao
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [9] DDoS Attack Detection under SDN Context
    Xu, Yang
    Liu, Yong
    [J]. IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,
  • [10] On improving the performance of DDoS attack detection system
    Batchu, Raj Kumar
    Seetha, Hari
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2022, 93