A TRAFFIC COHERENCE ANALYSIS MODEL FOR DDOS ATTACK DETECTION

被引:0
|
作者
Rahmani, Hamza [1 ]
Sahli, Nabil [1 ]
Kammoun, Farouk [1 ]
机构
[1] Natl Sch Comp Sci, CRISTAL Lab, Manouba 2010, Tunisia
关键词
Distributed denial of service; Probability distribution; Joint probability; Stochastic process; Central limit theorem;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed Denial of Service (DDoS) attack is a critical threat to the Internet by severely degrading its performance. DDoS attack can be considered a system anomaly or misuse from which abnormal behaviour is imposed on network traffic. Network traffic characterization with behaviour modelling could be a good indication of attack detection witch can be performed via abnormal behaviour identification. In this paper, we will focus on the design and evaluation of the statistically automated attack detection. Our key idea is that contrary to DDoS traffic, flash crowd is characterized by a large increase not only in the number of packets but also in the number of IP connexions. The joint probability between the packet arrival process and the number of IP connexions process presents a good estimation of the degree of coherence between these two processes. Statistical distances between an observation and a reference time windows are computed for joint probability values. We show and illustrate that anomalously large values observed on these distances betray major changes in the statistics of Internet time series and correspond to the occurrences of illegitimate anomalies.
引用
收藏
页码:148 / 154
页数:7
相关论文
共 50 条
  • [1] A covariance analysis model for DDoS attack detection
    Jin, SY
    Yeung, DS
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 1882 - 1886
  • [2] DDoS Attack Detection Algorithm Based on Hybrid Traffic Prediction Model
    Su, Yuze
    Meng, Xiangru
    Meng, Qingwei
    Han, Xiaoyang
    2018 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2018,
  • [3] Traffic Anomaly Detection in DDos Flooding Attack
    Purwanto, Yudha
    Hendrawan, Kuspriyanto
    Rahardjo, Budi
    2014 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2014,
  • [4] Joint Entropy Analysis Model for DDoS Attack Detection
    Rahmani, Hamza
    Sahli, Nabil
    Kammoun, Farouk
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 267 - 271
  • [5] Detection and analysis types of DDoS attack
    Navruzov, Erkin
    Kabulov, Anvar
    2022 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2022, : 203 - 209
  • [6] DDoS attack traffic distributed detection modelbased on ensemble classifiers
    Jia B.
    Ma Y.
    Zhao X.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2016, 44 : 1 - 5and10
  • [7] DDoS attack detection method based on LSTM traffic prediction
    Cheng J.
    Luo Y.
    Tang X.
    Ou M.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2019, 47 (04): : 32 - 36
  • [8] Detection of Hijacking DDoS Attack Based on Air Interface Traffic
    Fu, Qing-Yi
    Wang, Hui-Ming
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (10) : 2225 - 2229
  • [9] An alert analysis approach to DDoS attack detection
    Hoque, Nazrul
    Bhattacharyya, Dhruba K.
    Kalita, Jugal K.
    2016 INTERNATIONAL CONFERENCE ON ACCESSIBILITY TO DIGITAL WORLD (ICADW), 2016, : 33 - 38
  • [10] Authenticity analysis on DDoS attack detection for IDS
    Li P.
    Ding W.
    Ren W.
    Xia Z.
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2017, 47 : 9 - 13