Detection of DDoS attacks using optimized traffic matrix

被引:35
作者
Lee, Sang Min [3 ]
Kim, Dong Seong [1 ,2 ]
Lee, Je Hak [3 ]
Park, Jong Sou [3 ]
机构
[1] Univ Canterbury, Dept Comp Sci & Software Eng, Christchurch 1, New Zealand
[2] Duke Univ, Dept Elect & Comp Eng, Durham, NC USA
[3] Korea Aerosp Univ, Dept Comp Eng, Seoul, South Korea
关键词
DDoS attacks; Genetic algorithm; Intrusion detection; Traffic matrix;
D O I
10.1016/j.camwa.2011.08.020
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Distributed Denial of Service (DDoS) attacks have been increasing with the growth of computer and network infrastructures in Ubiquitous computing. DDoS attacks generating mass traffic deplete network bandwidth and/or system resources. It is therefore significant to detect DDoS attacks in their early stage. Our previous approach used a traffic matrix to detect DDoS attacks quickly and accurately. However, it could not find out to tune up parameters of the traffic matrix including (i) size of traffic matrix. (ii) time based window size, and (iii) a threshold value of variance from packets information with respect to various monitored environments and DDoS attacks. Moreover, the time based window size led to computational overheads when DDoS attacks did not occur. To cope with it, we propose an enhanced DDoS attacks detection approach by optimizing the parameters of the traffic matrix using a Genetic Algorithm (GA) to maximize the detection rates. Furthermore, we improve the traffic matrix building operation by (i) reforming the hash function to decrease hash collisions and (ii) replacing the time based window size with a packet based window size to reduce the computational overheads. We perform experiments with DARPA 2000 LLDOS 1.0, LBL-PKT-4 of Lawrence Berkeley Laboratory and generated attack datasets. The experimental results show the feasibility of our approach in terms of detection accuracy and speed. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:501 / 510
页数:10
相关论文
共 25 条
[1]  
[Anonymous], INTR DET SEC PROD
[2]  
[Anonymous], NETRANGER OV
[3]  
[Anonymous], OPEN SOURCE NETWORK
[4]  
[Anonymous], SECURENET PRO FEAT L
[5]  
[Anonymous], NFR NETW INTR DET
[6]  
Arbor Networks, 2008, WORLD WID INFR SEC R
[7]  
Brodsky B.E., 1993, DARKHOVSKY NONPARAME
[8]  
Computer Incident Advisory Capability, NETW INTR DET OV
[9]   DDoS attacks and defense mechanisms: classification and state-of-the-art [J].
Douligeris, C ;
Mitrokotsa, A .
COMPUTER NETWORKS, 2004, 44 (05) :643-666
[10]   Statistical approaches to DDoS attack detection and response [J].
Feinstein, L ;
Schnackenberg, D ;
Balupari, R ;
Kindred, D .
DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, :303-314