A queue model to detect DDos attacks

被引:0
作者
Hao, S [1 ]
Song, H [1 ]
Jiang, WB [1 ]
Dai, YQ [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
来源
2005 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, PROCEEDINGS | 2005年
关键词
anomaly detection; DDos attacks; quette model; Gaussian mixture model;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of network communication and collaboration, distributed denial-of-service (DDos) attack increasingly becomes one of the hardest and most annoying network security problems to address. In this paper, we present a new framework to detect the DDos attacks according to the packet flows of specific protocols. Our aim is to detect the attacks as early as possible and avoid the unnecessary false positive. A Gaussian parametrical mixture model is utilized to estimate the normal behavior and a queue model is adopted for detecting the attacks. Experiments verify that our proposed approach is effective and has reasonable accuracy.
引用
收藏
页码:106 / 112
页数:7
相关论文
共 50 条
[41]   KS-DDoS: Kafka streams-based classification approach for DDoS attacks [J].
Nilesh Vishwasrao Patil ;
C. Rama Krishna ;
Krishan Kumar .
The Journal of Supercomputing, 2022, 78 :8946-8976
[42]   DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks [J].
Ranjan, Supranamaya ;
Swaminathan, Ram ;
Uysal, Mustafa ;
Nucci, Antonio ;
Knightly, Edward .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (01) :26-39
[43]   Efficient Detection of DDoS Attacks Using a Hybrid Deep Learning Model with Improved Feature Selection [J].
Alghazzawi, Daniyal ;
Bamasag, Omaimah ;
Ullah, Hayat ;
Asghar, Muhammad Zubair .
APPLIED SCIENCES-BASEL, 2021, 11 (24)
[44]   Detection of DDoS attacks using optimized traffic matrix [J].
Lee, Sang Min ;
Kim, Dong Seong ;
Lee, Je Hak ;
Park, Jong Sou .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (02) :501-510
[45]   Detection of DoS/DDoS attacks: the UBM and GMM approach [J].
Martinez Osorio, Jorge Steven ;
Vergara Tejada, Jaime Alberto ;
Botero Vega, Juan Felipe .
2021 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2021), 2021, :866-871
[46]   A review on statistical approaches for anomaly detection in DDoS attacks [J].
Nooribakhsh, Mahsa ;
Mollamotalebi, Mahdi .
INFORMATION SECURITY JOURNAL, 2020, 29 (03) :118-133
[47]   An Intelligent Agent Based Defense Architecture for DDoS Attacks [J].
Duraipandian, M. ;
Palanisamy, C. .
2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
[48]   A Note on Analysing the Attacker Aims Behind DDoS Attacks [J].
Abhishta, Abhishta ;
Junger, Marianne ;
Joosten, Reinoud ;
Nieuwenhuis, Lambert J. M. .
INTELLIGENT DISTRIBUTED COMPUTING XIII, 2020, 868 :255-265
[49]   EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks [J].
Shukla, Praveen ;
Krishna, C. Rama ;
Patil, Nilesh Vishwasrao .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02) :1471-1490
[50]   Detection and Reaction against DDoS Attacks in Cellular Networks [J].
Rekhis, Slim ;
Chouchane, Alaaedine ;
Boudriga, Noureddine .
2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, :2520-2525