Traceback of DDoS Attacks Using Entropy Variations

被引:104
作者
Yu, Shui [1 ]
Zhou, Wanlei [1 ]
Doss, Robin [1 ]
Jia, Weijia [2 ]
机构
[1] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[2] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
基金
澳大利亚研究理事会;
关键词
DDoS; IP traceback; entropy variation; flow; PACKET MARKING; IP TRACEBACK; COLLABORATIVE DETECTION; DEFENSE;
D O I
10.1109/TPDS.2010.97
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memoryless feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. As a result, there is no effective and efficient method to deal with this issue so far. In this paper, we propose a novel traceback method for DDoS attacks that is based on entropy variations between normal and DDoS attack traffic, which is fundamentally different from commonly used packet marking techniques. In comparison to the existing DDoS traceback methods, the proposed strategy possesses a number of advantages-it is memory nonintensive, efficiently scalable, robust against packet pollution, and independent of attack traffic patterns. The results of extensive experimental and simulation studies are presented to demonstrate the effectiveness and efficiency of the proposed method. Our experiments show that accurate traceback is possible within 20 seconds (approximately) in a large-scale attack network with thousands of zombies.
引用
收藏
页码:412 / 425
页数:14
相关论文
共 43 条
[1]   Novel hybrid schemes employing packet marking and logging for IP traceback [J].
Al-Duwairi, B ;
Govindarasu, M .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2006, 17 (05) :403-418
[2]  
Aljifri H., 2003, IEEE Security & Privacy, V1, P24, DOI 10.1109/MSECP.2003.1203219
[3]  
*ARBORNETWORKS, 2010, IP FLOW BAS TECHN
[4]   ALPi: A DDoS defense system for high-speed networks [J].
Ayres, Paulo E. ;
Sun, Huizhong ;
Chao, H. Jonathan ;
Lau, Wing Cheong .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (10) :1864-1876
[5]   Tracing network attacks to their sources [J].
Baba, T ;
Matsuda, S .
IEEE INTERNET COMPUTING, 2002, 6 (02) :20-26
[6]   On IP traceback [J].
Belenky, A ;
Ansari, N .
IEEE COMMUNICATIONS MAGAZINE, 2003, 41 (07) :142-153
[7]   IP traceback with deterministic packet marking [J].
Belenky, A ;
Ansari, N .
IEEE COMMUNICATIONS LETTERS, 2003, 7 (04) :162-164
[8]  
Bremler-Barr A, 2005, IEEE INFOCOM SER, P536
[9]   A divide-and-conquer strategy for thwarting distributed denial-of-service attacks [J].
Chen, Ruiliang ;
Park, Jung-Min ;
Marchany, Randolph .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (05) :577-588
[10]   Collaborative detection and filtering of shrew DDoS attacks using spectral analysis [J].
Chen, Yu ;
Hwang, Kai .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (09) :1137-1151