Two-stage Detection Algorithm for RoQ attack Based on Localized Periodicity Analysis of Traffic Anomaly

被引:0
作者
Wen, Kun [1 ]
Yang, Jiahai [1 ]
Cheng, Fengjuan [2 ]
Li, Chenxi [1 ]
Wang, Ziyu [1 ]
Yin, Hui [2 ]
机构
[1] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing 100084, Peoples R China
[2] Henan Univ Technol, Coll Informat Sci & Engn, Zhengzhou 450000, Peoples R China
来源
2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN) | 2014年
关键词
network security; anomaly detection; misuse detection; RoQ attack; wavelet analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Reduction of Quality (RoQ) attack is a stealthy denial of service attack. It can decrease or inhibit normal TCP flows in network. Victims are hard to perceive it as the final network throughput is decreasing instead of increasing during the attack. Therefore, the attack is strongly hidden and it is difficult to be detected by existing detection systems. Based on the principle of Time-Frequency analysis, we propose a two-stage detection algorithm which combines anomaly detection with misuse detection. In the first stage, we try to detect the potential anomaly by analyzing network traffic through Wavelet multi-resolution analysis method. According to different time-domain characteristics, we locate the abrupt change points. In the second stage, we further analyze the local traffic around the abrupt change point. We extract the potential attack characteristics by autocorrelation analysis. By the two-stage detection, we can ultimately confirm whether the network is affected by the attack. Results of simulations and real network experiments demonstrate that our algorithm can detect RoQ attacks, with high accuracy and high efficiency.
引用
收藏
页数:6
相关论文
共 17 条
  • [1] [Anonymous], 2007 IEEE INT C COMM
  • [2] Discrete Wavelet Transform-Based Time Series Analysis and Mining
    Chaovalit, Pimwadee
    Gangopadhyay, Aryya
    Karabatis, George
    Chen, Zhiyuan
    [J]. ACM COMPUTING SURVEYS, 2011, 43 (02)
  • [3] Chen H, 2013, IEEE INFOCOM SER, P1780
  • [4] Guirguis M, 2005, IEEE INFOCOM SER, P1362
  • [5] Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
    Guirguis, Mina
    Tharp, Joshua
    Bestavros, Azer
    Matta, Ibrahim
    [J]. 2009 EIGHTH INTERNATIONAL CONFERENCE ON NETWORKS, 2009, : 445 - +
  • [6] Kuzmanovic A, 2003, ACM SIGCOMM COMP COM, V33, P75
  • [7] Kwok Y., 2005, Proceeding of the 3rd International Conference on Networking and Mobile Computing (ICCNMC 2005), P423
  • [8] Lou Xiapu, 2005, P NETW DISTR SYST SE
  • [9] Luo XP, 2006, IEEE IFIP NETW OPER, P507
  • [10] MAGNAGHI A, 2004, P ACM SIGCOMM WORKSH, P253