Characterizing flash events and distributed denial-of-service attacks: an empirical investigation

被引:41
作者
Bhandari, Abhinav [1 ]
Sangal, Amrit Lal [1 ]
Kumar, Krishan [2 ]
机构
[1] Dr BR Ambdekar NIT Jalandhar, Dept Comp Sci & Engn, Jalandar, Punjab, India
[2] Shaheed Bhagat Singh State Tech Campus, Ferozepur, Punjab, India
关键词
DDoS attacks; flash event; page access behavior; flow similarity; botnet; BEHAVIOR;
D O I
10.1002/sec.1472
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the information age where Internet is the most important means of delivery of plethora of services, distributed denial-of-service (DDoS) attacks have emerged as one of the most serious threat. Strategic, security, social, and financial implications of these attacks have ceaselessly alarmed the entire cyber community. To obviate a DDoS attack and mitigate its impact, there is an irrevocable prerequisite to accurately detect them promptly. An inherent challenge in addressing this issue is to efficiently distinguish these attacks from characteristically analogous flash events (FEs) which are bona fide occurrences generated by legitimate users. Most of the studies have focused on finding out the unique characteristics of DDoS attacks in isolation, with the peril of false alarms heuristically. To preclude this, it is pertinent to fundamentally focus on identifying the unique characteristics of FE vis-a-vis DDoS attacks ab initio which has been the basis of this work. The aim of this paper is to formulate the taxonomy of FEs and compare the characteristics of FEs and DDoS attacks to segregate these using several empirical metrics. Real and emulation datasets have been used to validate the characteristics of both. The extensive analysis in this study establishes that there are numerous technical dissimilarities that can be exploited to separate these similar looking events. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:2222 / 2239
页数:18
相关论文
共 36 条
  • [1] Ahmed E, 2010, USE IP ADDRESSES HIG, P124
  • [2] Alefiya Heidemann J, 2003, FRAMEWORK CLASSIFYIN, P99
  • [3] [Anonymous], 1997, DENIAL SERVICE ATTAC
  • [4] [Anonymous], 2007, CAIDA DDOS ATT 2007
  • [5] Arbor, 2014, TECHNICAL REPORT
  • [6] A workload characterization study of the 1998 World Cup Web site
    Arlitt, M
    Jin, T
    [J]. IEEE NETWORK, 2000, 14 (03): : 30 - 37
  • [7] Bhatia S., 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P210, DOI 10.1109/ARES.2011.39
  • [8] A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events
    Bhatia, Sajal
    Schmidt, Desmond
    Mohay, George
    Tickle, Alan
    [J]. COMPUTERS & SECURITY, 2014, 40 : 95 - 107
  • [9] Bhatia S, 2012, PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, P79
  • [10] Modelling Web-server Flash Events
    Bhatia, Sajal
    Mohay, George
    Schmidt, Desmond
    Tickle, Alan
    [J]. 2012 11TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2012, : 79 - 86