Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient

被引:145
作者
Yu, Shui [1 ]
Zhou, Wanlei [1 ]
Jia, Weijia [2 ]
Guo, Song [3 ]
Xiang, Yong [1 ]
Tang, Feilong [4 ]
机构
[1] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[2] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[3] Univ Aizu, Performance Evaluat Lab, Sch Comp Sci & Engn, Aizu Wakamatsu, Fukushima 9658580, Japan
[4] Shanghai Jiao Tong Univ, Sch Software, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
DDoS attacks; flash crowds; similarity; discrimination;
D O I
10.1109/TPDS.2011.262
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed Denial of Service (DDoS) attack is a critical threat to the Internet, and botnets are usually the engines behind them. Sophisticated botmasters attempt to disable detectors by mimicking the traffic patterns of flash crowds. This poses a critical challenge to those who defend against DDoS attacks. In our deep study of the size and organization of current botnets, we found that the current attack flows are usually more similar to each other compared to the flows of flash crowds. Based on this, we proposed a discrimination algorithm using the flow correlation coefficient as a similarity metric among suspicious flows. We formulated the problem, and presented theoretical proofs for the feasibility of the proposed discrimination method in theory. Our extensive experiments confirmed the theoretical analysis and demonstrated the effectiveness of the proposed method in practice.
引用
收藏
页码:1073 / 1080
页数:8
相关论文
共 25 条
[1]  
[Anonymous], 2008, US WORKSH LARG SCAL
[2]  
[Anonymous], COMPUTER J ACM COMPU
[3]  
[Anonymous], P 13 NETW DISTR SYST
[4]  
[Anonymous], 2011, WORLDCUP98
[5]  
Arbor, 2011, IP FLOW BAS TECHN
[6]  
Bailey M., 2009, P CYB APPL TECHN C H
[7]   Denial-of-service attack-detection techniques [J].
Carl, G ;
Kesidis, G ;
Brooks, RR ;
Rai, S .
IEEE INTERNET COMPUTING, 2006, 10 (01) :82-89
[8]   Collaborative detection and filtering of shrew DDoS attacks using spectral analysis [J].
Chen, Yu ;
Hwang, Kai .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (09) :1137-1151
[9]  
Cheng G., 2011, MALWARE FAQ ANAL DDO
[10]  
CHO C., 2010, P 3 USENIX C LARG SC