A TRAFFIC COHERENCE ANALYSIS MODEL FOR DDOS ATTACK DETECTION

被引:0
|
作者
Rahmani, Hamza [1 ]
Sahli, Nabil [1 ]
Kammoun, Farouk [1 ]
机构
[1] Natl Sch Comp Sci, CRISTAL Lab, Manouba 2010, Tunisia
关键词
Distributed denial of service; Probability distribution; Joint probability; Stochastic process; Central limit theorem;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed Denial of Service (DDoS) attack is a critical threat to the Internet by severely degrading its performance. DDoS attack can be considered a system anomaly or misuse from which abnormal behaviour is imposed on network traffic. Network traffic characterization with behaviour modelling could be a good indication of attack detection witch can be performed via abnormal behaviour identification. In this paper, we will focus on the design and evaluation of the statistically automated attack detection. Our key idea is that contrary to DDoS traffic, flash crowd is characterized by a large increase not only in the number of packets but also in the number of IP connexions. The joint probability between the packet arrival process and the number of IP connexions process presents a good estimation of the degree of coherence between these two processes. Statistical distances between an observation and a reference time windows are computed for joint probability values. We show and illustrate that anomalously large values observed on these distances betray major changes in the statistics of Internet time series and correspond to the occurrences of illegitimate anomalies.
引用
收藏
页码:148 / 154
页数:7
相关论文
共 50 条
  • [21] DDoS attack detection and wavelets
    Li, L
    Lee, G
    ICCCN 2003: 12TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2003, : 421 - 427
  • [22] FLDDoS: DDoS Attack Detection Model based on Federated Learning
    Zhang, Jiachao
    Yu, Peiran
    Qi, Le
    Liu, Song
    Zhang, Haiyu
    Zhang, Jianzhong
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 635 - 642
  • [23] Timeslot Monitoring Model for Application Layer DDoS Attack Detection
    Choi, Y. S.
    Oh, J. T.
    Jang, J. S.
    Kim, I. K.
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 677 - 679
  • [24] DDoS Attack Detection Algorithm Based on IP Entropy Model
    Wang Xintong
    Liu Guqing
    Yang Jungang
    Ran Jinzhi
    PROCEEDINGS OF THE 2015 INTERNATIONAL INDUSTRIAL INFORMATICS AND COMPUTER ENGINEERING CONFERENCE, 2015, : 179 - 182
  • [25] DDoS Attack Detection Method Based on Linear Prediction Model
    Cheng, Jieren
    Yin, Jianping
    Wu, Chengkun
    Zhang, Boyun
    Liu, Yun
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 1004 - +
  • [26] Forensic Model for DDoS Attack
    Luo, Yun
    Fu, Xiao
    Luo, Bin
    Du, Xiaojiang
    Guizani, Mohsen
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [27] Detection of Application Layer DDoS Attack with Clustering and Likelihood Analysis
    Chwalinski, Pawel
    Belavkin, Roman
    Cheng, Xiaochun
    2013 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2013, : 217 - 222
  • [28] Non-negative Increment Feature Detection of the Traffic Throughput for Early DDoS Attack
    Huang, Ying
    Sun, Huizhong
    Chao, H. Jonathan
    Chao, Xiong
    SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 121 - +
  • [29] DDoS Flooding Attack Detection Based on Joint-entropy with Multiple Traffic Features
    Mao, Jiewen
    Deng, Weijun
    Shen, Fuke
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 237 - 243
  • [30] Belief-DDoS: stepping up DDoS attack detection model using DBN algorithm
    Wanda P.
    Hiswati M.E.
    International Journal of Information Technology, 2024, 16 (1) : 271 - 278