A adaptive filtration based defense framework against DDoS

被引:0
|
作者
Zhang, Jian [1 ]
Zhou, Xiaxia [1 ]
Zhang, Wei [1 ]
Liang, Qidi [1 ]
Xiang, Fengtao [2 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha, Hunan, Peoples R China
[2] Natl Univ Def Technol, Coll Mechatron Engn & Automat, Changsha, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
DDoS; Spark Streaming; Spark; HBase; CUSUM; ATTACKS;
D O I
10.1109/ISPA/IUCC.2017.00113
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While increasing cloud services are exposed to DDoS, DDoS defense has becoming more and more challenging. A single server with limited computing and memory resource can hardly handle large packet traces which are captured on fast links. In this paper, we propose a spark-streaming based online DDoS defense framework. First, we present a analysis model to identify abnormal packets. Second, we develop a defense model based on the statistics of abnormal packets. Our framework has two main advantages: (1) Our framework is configurable and with expert system functionality; the information maintained to detect threats is also leveraged during mitigation to effectively distinguishing legitimate from suspicious traffic; (2) Based on spark-streaming, our framework allows for parallel and distributed traffic analysis that can be deployed at high-speed network links. At the same time, by employing improved bloom-filter for approximated checks with low false positive/negative errors, it also reduces the space required to maintain the information leveraged for the threat detection and mitigation. The evaluation with data sets derived from real network traffic validates the performance of our framework in terms of detection accuracy, filtering efficiency, and monitoring overhead. The experiments show that our framework is able to detect DDoS attacks in the early stage of attack, to mitigate them by filtering out the majority of the abnormal packets while keeping a high percentage of the legitimate traffic unaffected.
引用
收藏
页码:729 / 736
页数:8
相关论文
共 50 条
  • [41] A Comprehensive Survey of Distributed Defense Techniques against DDoS Attacks
    Sachdeva, Monika
    Singh, Gurvinder
    Kumar, Krishan
    Singh, Kuldip
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12): : 7 - 15
  • [42] MSOM: Efficient Mechanism for Defense against DDoS Attacks in VANET
    Al-Mehdhara, Mohammed
    Ruan, Na
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [43] Distributed and Predictive-Preventive Defense Against DDoS Attacks
    Jog, Manjiri
    Natu, Maitreya
    Shelke, Sushama
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2015,
  • [44] A DDoS-Oriented Distributed Defense Framework Based on Edge Router Feedbacks in Autonomous Systems
    Bi, Xiaoming
    Tan, Wenan
    Xiao, Ruohui
    2008 INTERNATIONAL MULTISYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS), 2008, : 132 - +
  • [45] Global Orchestration of Cooperative Defense against DDoS Attacks for MEC
    Tan, Xinrui
    Li, Hongjia
    Wang, Liming
    Xu, Zhen
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [46] METHODOLOGIES FOR EVALUATING GAME THEORETIC DEFENSE AGAINST DDOS ATTACKS
    Khirwadkar, Tanmay
    Nguyen, Kien C.
    Nicol, David M.
    Basar, Tamer
    PROCEEDINGS OF THE 2010 WINTER SIMULATION CONFERENCE, 2010, : 697 - 707
  • [47] gore:: Routing-assisted defense against DDoS attacks
    Chou, ST
    Stavrou, A
    Ioannidis, J
    Keromytis, AD
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 179 - 193
  • [48] DDoS attacks defense based on active networks
    Chen, Jui-Ming
    Wang, Kai-Ping
    Chou, Li-Der
    Journal of Internet Technology, 2006, 7 (02): : 205 - 213
  • [49] Distributed Capabilities-based DDoS Defense
    Jog, Manjiri
    Natu, Maitreya
    Shelke, Sushama
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [50] An Outlier Detection Based DDoS Defense Method
    Wang, Dongqi
    Zhu Yufu
    Chang Guiran
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 511 - 514