DDoS Attack Detection Using IP Address Feature Interaction

被引:20
|
作者
Cheng, Jieren [1 ]
Yin, Jianping [1 ]
Liu, Yun [1 ]
Cai, Zhiping [1 ]
Wu, Chengkun [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS 2009) | 2009年
关键词
Network Security; Distributed Denial of Service; IP Address Interaction Feature; SVM classifier; DEFENSE;
D O I
10.1109/INCOS.2009.34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed denial-of-service (DDoS) attacks present serious threats to servers in the Internet. We argue that the difference of the goals, manners and results of the interaction behaviors of normal flows and attack flows, which show different characteristics on IP addresses and ports. IAI (TP Address Interaction Feature) algorithm is proposed based on the addresses interaction, abrupt traffic change, addresses many-to-one dissymmetry, distributed source IP addresses and concentrated target addresses. The IAI is designed to describe the essential characteristics of network flow states. Furthermore, a support vector machine (SVM) classifier, which is trained by IAI time series from normal flow and attack flow, is applied to classify the state of current network flows and identify the DDoS attacks. The experiment results show that, IAI can reflect the different characteristics of DDoS attack flows and normal flows; the IAI-based detection scheme can distinguish between normal flows and abnormal flows with DDoS attack flows effectively, and help to identify fast and accurate attack flows when the attacking traffic is hidden among a relatively large volume of normal flows or close to the attacking sources, and it has higher detection and lower false alarm rate compared with related works.
引用
收藏
页码:113 / 118
页数:6
相关论文
共 50 条
  • [21] DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics
    Tao, Yuan
    Yu, Shui
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 233 - 240
  • [22] Lightweight DDoS Attack Detection Using Bayesian Space-Time Correlation
    Mendonca, Gabriel
    Leao, Rosa M. M.
    Silva, Edmundo De Souza E.
    Towsley, Don
    IEEE ACCESS, 2025, 13 : 55769 - 55800
  • [23] DDoS Attack Detection Using Hybrid Machine Learning Based IDS Models
    Sumathi, S.
    Rajesh, R.
    Karthikeyan, N.
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2022, 81 (03): : 276 - 286
  • [24] Improvement in DDoS attack detection in software defined network using ML algorithm
    Chattopadhyay, Saumitra
    Sahoo, Ashok Kumar
    Jasola, Sanjay
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (07) : 2025 - 2044
  • [25] DDoS attack detection algorithms based on entropy computing
    Li, Liying
    Zhou, Jianying
    Xiao, Ning
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 452 - +
  • [26] DDoS Attack Detection Approaches in on Software Defined Network
    Muzafar, Saira
    Jhanjhi, N. Z.
    Khan, Navid Ali
    Ashfaq, Farzeen
    2022 14TH INTERNATIONAL CONFERENCE ON MATHEMATICS, ACTUARIAL SCIENCE, COMPUTER SCIENCE AND STATISTICS (MACS), 2022,
  • [27] Joint Entropy Analysis Model for DDoS Attack Detection
    Rahmani, Hamza
    Sahli, Nabil
    Kammoun, Farouk
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 267 - 271
  • [28] Application Layer DDOS Attack Detection and Defense Methods
    Sreenivasarao, Sadhu
    PROCEEDINGS OF EMERGING TRENDS AND TECHNOLOGIES ON INTELLIGENT SYSTEMS (ETTIS 2021), 2022, 1371 : 1 - 12
  • [29] DDoS Attack Detection: Strategies, Techniques, and Future Directions
    Patil, Vinay Tila
    Deore, Shailesh Shivaji
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (09) : 2030 - 2046
  • [30] A TRAFFIC COHERENCE ANALYSIS MODEL FOR DDOS ATTACK DETECTION
    Rahmani, Hamza
    Sahli, Nabil
    Kammoun, Farouk
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 148 - 154