Detection strategies for post-pandemic DDoS profiles

被引:0
作者
Orosz, Peter [1 ]
Nagy, Balazs [1 ]
Varga, Pal [1 ]
机构
[1] Budapest Univ Technol & Econ, Dept Telecommun & Media Informat, Fac Elect Engn & Informat, Budapest, Hungary
来源
INFOCOMMUNICATIONS JOURNAL | 2023年 / 15卷 / 04期
关键词
Intrusion detection and prevention; DDoS; Network security; Machine learning; ATTACKS; DEFENSE; SDN; BOTNET; IOT; MODEL; ENTROPY; DEVICES; DOS;
D O I
10.36244/ICJ.2023.4.4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The global pandemic lockdowns fostered the digital transition of companies worldwide since most of their employees worked from home using public or private cloud services. Accordingly, these services became the primary targets of the latest generation DDoS threats. While some features of current DDoS attack profiles appeared before the pandemic period, they became significant and reached their current complexity in the recent period. Besides applying novel methods and tools, the attacks' frequency, extent, and complexity also increased significantly. The combination of various attack vectors opened the way for multi-vector attacks incorporating a unique blend of L3-L7 attacking profiles. Unifying the hit-and-run method and the multi-vector approach contributed to the remarkable rise in success rate. The current paper has two focal points. First, it discusses the profiles of the latest DDoS attacks discovered in real data center infrastructures. To demonstrate and emphasize the changes in attack profile, we reference attack samples recently collected in various data center networks. Second, it provides a comprehensive survey of the state-of-the-art detection methods related to recent attacks. The paper especially focuses on the accuracy and speed of these, mostly networking-related detection approaches. Furthermore, we define features and quantitative and qualitative requirements to support detection methods handling the latest threat profiles.
引用
收藏
页码:26 / 39
页数:14
相关论文
共 66 条
[1]  
Akamai, 2021, Volumetric ddos attacks rising fast
[2]  
Ali A. I. A., 2020, IEEE Access, V8, p212 220, DOI [10.1109/ACCESS20203039985, DOI 10.1109/ACCESS20203039985]
[3]   A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning [J].
Arturo Perez-Diaz, Jesus ;
Amezcua Valdovinos, Ismael ;
Choo, Kim-Kwang Raymond ;
Zhu, Dakai .
IEEE ACCESS, 2020, 8 :155859-155872
[4]  
Balachandran A, 2023, LECT N MOBIL, P85, DOI [10.1007/978-981-99-1312-1_7, 10.1007/978-3-031-11112-9_8]
[5]  
Balarezo J. F., 2020, 2020 14 INT C SIGN P, P1, DOI [10.1109/ICSPCS50536.2020.9310040, DOI 10.1109/ICSPCS50536.2020.9310040]
[6]  
Chen H, 2013, IEEE INFOCOM SER, P1780
[7]   Real-Time DDoS Defense in 5G-Enabled IoT: A Multidomain Collaboration Perspective [J].
Chen, Xu ;
Chen, Yunfei ;
Feng, Wei ;
Xiao, Liang ;
Li, Xiangling ;
Zhang, Jie ;
Ge, Ning .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (05) :4490-4505
[8]   DDoS Defense for IoT: A Stackelberg Game Model-Enabled Collaborative Framework [J].
Chen, Xu ;
Xiao, Liang ;
Feng, Wei ;
Ge, Ning ;
Wang, Xianbin .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) :9659-9674
[9]  
cisco.com, 2020, Cisco White Paper, Cisco annual internet report (2018-2023) white paper."
[10]  
Corero, 2021, Corero ddos threat intelligence report 2021