DDoS Attack Detection Using IP Address Feature Interaction

被引:20
作者
Cheng, Jieren [1 ]
Yin, Jianping [1 ]
Liu, Yun [1 ]
Cai, Zhiping [1 ]
Wu, Chengkun [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS 2009) | 2009年
关键词
Network Security; Distributed Denial of Service; IP Address Interaction Feature; SVM classifier; DEFENSE;
D O I
10.1109/INCOS.2009.34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed denial-of-service (DDoS) attacks present serious threats to servers in the Internet. We argue that the difference of the goals, manners and results of the interaction behaviors of normal flows and attack flows, which show different characteristics on IP addresses and ports. IAI (TP Address Interaction Feature) algorithm is proposed based on the addresses interaction, abrupt traffic change, addresses many-to-one dissymmetry, distributed source IP addresses and concentrated target addresses. The IAI is designed to describe the essential characteristics of network flow states. Furthermore, a support vector machine (SVM) classifier, which is trained by IAI time series from normal flow and attack flow, is applied to classify the state of current network flows and identify the DDoS attacks. The experiment results show that, IAI can reflect the different characteristics of DDoS attack flows and normal flows; the IAI-based detection scheme can distinguish between normal flows and abnormal flows with DDoS attack flows effectively, and help to identify fast and accurate attack flows when the attacking traffic is hidden among a relatively large volume of normal flows or close to the attacking sources, and it has higher detection and lower false alarm rate compared with related works.
引用
收藏
页码:113 / 118
页数:6
相关论文
共 50 条
  • [41] Detection of DDoS Attack in IoT Networks Using Sample Selected RNN-ELM
    Hariprasad, S.
    Deepa, T.
    Bharathiraja, N.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03) : 1425 - 1440
  • [42] Protecting servers against DDoS attacks with improved source IP address monitoring scheme
    Takada, Hellinton Hatsuo
    Anzaloni, Alessandro
    2006 2ND CONFERENCE ON NEXT GENERATION INTERNET DESIGN AND ENGINEERING, 2006, : 154 - +
  • [43] Study of detection method for spoofed IP against DDoS attacks
    Lee, Yong-Joon
    Baik, Nam-Kyun
    Kim, Cheonshik
    Yang, Ching-Nung
    PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (01) : 35 - 44
  • [44] Hifoots: A Highly Efficient DDoS Attack Detection Scheme Deployed in Smart IoT Homes
    Wang, Yipeng
    Zhang, Xintong
    Lai, Yingxu
    Zhao, Zijian
    Deng, Yongjian
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2025, 11 (01) : 519 - 533
  • [45] DDoS ATTACK DETECTION METHODS BASED ON DEEP LEARNING IN HEALTHCARE
    Wang, Chaoying
    Zhu, Ting
    JOURNAL OF MECHANICS IN MEDICINE AND BIOLOGY, 2023, 23 (04)
  • [46] New View on the Current Detection and Defense DDoS Attack System
    Pan, Xuegong
    PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, 2011, : 288 - 291
  • [47] High-Speed Network DDoS Attack Detection: A Survey
    Haseeb-ur-rehman, Rana M. Abdul
    Aman, Azana Hafizah Mohd
    Hasan, Mohammad Kamrul
    Ariffin, Khairul Akram Zainol
    Namoun, Abdallah
    Tufail, Ali
    Kim, Ki-Hyung
    SENSORS, 2023, 23 (15)
  • [48] Overview of DDoS Attack Detection in Software-Defined Networks
    Wang, Heyu
    Li, Yixuan
    IEEE ACCESS, 2024, 12 : 38351 - 38381
  • [49] Improving Performance of Collaborative Source Side DDoS Attack Detection
    Yeom, Sungwoong
    Kim, Kyungbaek
    APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2020, : 239 - 242
  • [50] An effective DDoS attack detection and packet-filtering scheme
    Jeong, Seokbong
    Kim, Hyunwoo
    Kim, Sehun
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2006, E89B (07) : 2033 - 2042