DDoS Attack Detection Using IP Address Feature Interaction

被引:20
作者
Cheng, Jieren [1 ]
Yin, Jianping [1 ]
Liu, Yun [1 ]
Cai, Zhiping [1 ]
Wu, Chengkun [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS 2009) | 2009年
关键词
Network Security; Distributed Denial of Service; IP Address Interaction Feature; SVM classifier; DEFENSE;
D O I
10.1109/INCOS.2009.34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed denial-of-service (DDoS) attacks present serious threats to servers in the Internet. We argue that the difference of the goals, manners and results of the interaction behaviors of normal flows and attack flows, which show different characteristics on IP addresses and ports. IAI (TP Address Interaction Feature) algorithm is proposed based on the addresses interaction, abrupt traffic change, addresses many-to-one dissymmetry, distributed source IP addresses and concentrated target addresses. The IAI is designed to describe the essential characteristics of network flow states. Furthermore, a support vector machine (SVM) classifier, which is trained by IAI time series from normal flow and attack flow, is applied to classify the state of current network flows and identify the DDoS attacks. The experiment results show that, IAI can reflect the different characteristics of DDoS attack flows and normal flows; the IAI-based detection scheme can distinguish between normal flows and abnormal flows with DDoS attack flows effectively, and help to identify fast and accurate attack flows when the attacking traffic is hidden among a relatively large volume of normal flows or close to the attacking sources, and it has higher detection and lower false alarm rate compared with related works.
引用
收藏
页码:113 / 118
页数:6
相关论文
共 22 条
[11]  
Forrest S, 1999, EVOLUTION COMPUTAT J, V7, P45
[12]  
HANDLEY M, 2005, DOS RESISTANT INTERN
[13]   On Remote Exploitation of TCP Sender for Low-Rate Flooding Denial-of-Service Attack [J].
Kumar, V. Anil ;
Jayalekshmy, P. S. ;
Patra, G. K. ;
Thangavelu, R. P. .
IEEE COMMUNICATIONS LETTERS, 2009, 13 (01) :46-48
[14]  
Lakhina A, 2004, P ACM SIGCOMM PORTL
[15]  
Li J, 2002, IEEE INFOCOM SER, P1557, DOI 10.1109/INFCOM.2002.1019407
[16]   Evaluation of a low-rate DoS attack against application servers [J].
Macia-Fernandez, Gabriel ;
Diaz-Verdejo, Jesue E. ;
Garcia-Teodoro, Pedro .
COMPUTERS & SECURITY, 2008, 27 (7-8) :335-354
[17]   Network intrusion and fault detection: A statistical anomaly approach [J].
Manikopoulos, C ;
Papavassiliou, S .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) :76-82
[18]   D-WARD: A source-end defense against flooding denial-of-service attacks [J].
Mirkovic, J ;
Reiher, P .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) :216-232
[19]  
Peng T, 2004, LECT NOTES COMPUT SC, V3042, P771
[20]  
PLATT, 1998, 9814 MICR RES