Mitigating DDoS using weight-based geographical clustering

被引:5
作者
Kongshavn, Madeleine [1 ]
Haugerud, Harek [2 ]
Yazidi, Anis [2 ]
Maseng, Torleiv [3 ]
Hammer, Hugo [2 ]
机构
[1] Univ Agder, Dept Informat & Commun Technol, Grimstad, Norway
[2] OsloMet Oslo Metropolitan Univ, Dept Comp Sci, Oslo, Norway
[3] Univ Oslo, Dept Technol Syst, Oslo, Norway
关键词
Address Clustering; Anomaly Intrusion Detection; Clustering Techniques; Geographical IP; Mitigation Techniques; Mitigating DDoS Attacks; ATTACKS; ALGORITHM; DEFENSE; IP;
D O I
10.1002/cpe.5679
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Distributed denial of service (DDoS) attacks have for the last two decades been among the greatest threats facing the internet infrastructure. Mitigating DDoS attacks is a particularly challenging task as an attacker tries to conceal a huge amount of traffic inside a legitimate traffic flow. This article proposes to use data mining approaches to find unique hidden data structures which are able to characterize the normal traffic flow. This will serve as a mean for filtering illegitimate traffic under DDoS attacks. In this endeavor, we devise three algorithms built on previously uncharted areas within mitigation techniques where clustering techniques are used to create geographical clusters in regions which are likely to contain legitimate traffic. We argue through extensive experimental results that establishing clusters around this narrative is a superior solution to clustering algorithms which rely on bitwise distances between IP addresses. In addition, the DDoS filtering algorithm is deployed in a virtual Linux environment using Nfqueue and tested in a simulated real-life DDoS attack.
引用
收藏
页数:17
相关论文
共 61 条
[1]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[2]  
[Anonymous], 2007, NDSS
[3]  
Argyraki K, 2005, P ANN C USENIX ANN T
[4]   D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events [J].
Behal, Sunny ;
Kumar, Krishan ;
Sachdeva, Monika .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 111 :49-63
[5]   Characterizing flash events and distributed denial-of-service attacks: an empirical investigation [J].
Bhandari, Abhinav ;
Sangal, Amrit Lal ;
Kumar, Krishan .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) :2222-2239
[6]  
Bhatia S., 2018, Versatile Cybersecur, P55
[7]   ST-DBSCAN: An algorithm for clustering spatial-temp oral data [J].
Birant, Derya ;
Kut, Alp .
DATA & KNOWLEDGE ENGINEERING, 2007, 60 (01) :208-221
[8]  
Bradley P. S., 1998, Machine Learning. Proceedings of the Fifteenth International Conference (ICML'98), P91
[9]  
Broder A., 2004, Internet Math., V1, P485, DOI DOI 10.1080/15427951.2004.10129096
[10]   An Abnormal Network Flow Feature Sequence Prediction Approach for DDoS Attacks Detection in Big Data Environment [J].
Cheng, Jieren ;
Xu, Ruomeng ;
Tang, Xiangyan ;
Sheng, Victor S. ;
Cai, Canting .
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (01) :95-119