System for DDoS attack mitigation by discovering the attack vectors through statistical traffic analysis

被引:3
作者
Mirchev M.J. [1 ]
Mirtchev S.T. [1 ]
机构
[1] Faculty of Telecommunications, Technical University of Sofia, 8 Kl.Ohridski Blvd, Sofia
关键词
DDoS attack; Distributed denial-of-service; IP network security; Statistical analysis; Vector of attack;
D O I
10.1504/IJICS.2020.109479
中图分类号
学科分类号
摘要
DDoS attacks are becoming an increasing threat to the internet due to the easy availability of user-friendly attack tools. In meantime defending from such attacks is very difficult, because it is very hard to differentiate between the legitimate traffic and attack traffic and also maintain the attacked service still accessible while under attack. This paper describes a method for discovering the vector of a DDoS attack using statistical traffic analysis. The discussed methods are based on having a notification of the attack and making a statistical analysis of the attack traffic to find the vector and profiling a statistical baseline of normal traffic and discovering the abnormal traffic as a difference in the statistical parameters of TCP/IP packets in a given moment to the baseline and thus making a decision of the attack and its vector simultaneously. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:309 / 321
页数:12
相关论文
共 50 条
[41]   Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment [J].
Kriti Bhushan ;
B. B. Gupta .
Journal of Ambient Intelligence and Humanized Computing, 2019, 10 :1985-1997
[42]   A fractional-step DDoS attack source traceback algorithm based on autonomous system [J].
Qu Zhaoyang ;
Huang Chunfeng .
2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, :1383-1387
[43]   Flow and unified information-based DDoS attack detection system for multi-topology IoT networks [J].
Saiyed, Makhduma F. ;
Al-Anbagi, Irfan .
INTERNET OF THINGS, 2023, 24
[44]   Analysis and Protection of DDOS Attack Based on RSSP-II Protocol<bold> </bold> [J].
Liang, Zhongdi ;
Hei, Xinhong ;
Wang, Yichuan ;
Ji, Wenjiang ;
Zhu, Lei ;
Zhang, Yefei .
2018 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2018, :117-120
[45]   Performance analysis of ODL and RYU controllers' against DDoS attack in software defined networks [J].
Gupta, Neelam ;
Tanwar, Sarvesh ;
Badotra, Sumit .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (08) :10899-10919
[46]   Intrusion Prevention System for DDoS Attack on VANET With reCAPTCHA Controller Using Information Based Metrics [J].
Poongodi, M. ;
Vijayakumar, V. ;
Al-Turjman, Fadi ;
Hamdi, Mounir ;
Ma, Maode .
IEEE ACCESS, 2019, 7 :158481-158491
[47]   Performance Analysis of the Impact of DDoS Attack on Routing Protocols in Infrastructure-less Mobile Networks [J].
Sultan, Mohamad T. ;
El Sayed, Hesham ;
Khan, Manzoor Ahmed .
2022 5TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS, SIGNAL PROCESSING, AND THEIR APPLICATIONS (ICCSPA), 2022,
[48]   A Genetic Algorithm- and t-Test-Based System for DDoS Attack Detection in IoT Networks [J].
Saiyed, Makhduma F. ;
Al-Anbagi, Irfan .
IEEE ACCESS, 2024, 12 :25623-25641
[49]   Dynamic multiphase DDoS attack identification and mitigation framework to secure SDN-based fog-empowered consumer IoT Networks [J].
Chaudhary, Pooja ;
Singh, A. K. ;
Gupta, B. B. .
COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
[50]   Low rate DDoS mitigation using real-time multi threshold traffic monitoring system [J].
Baskar, M. ;
Ramkumar, J. ;
Karthikeyan, C. ;
Anbarasu, V. ;
Balaji, A. ;
Arulananth, T. S. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,