Detect and Identify DDoS Attacks from Flash Crowd Based on Self-similarity and Renyi Entropy

被引:0
作者
Yan, Ruoyu [1 ]
Xu, Guoyu [1 ]
Qin, XueJing [1 ]
机构
[1] Henan Univ Econ & Law, Coll Comp & Informat Engn, Zhengzhou, Henan, Peoples R China
来源
2017 CHINESE AUTOMATION CONGRESS (CAC) | 2017年
基金
中国国家自然科学基金;
关键词
Distributed Denial of Service; Flash Crowd; Information Theory; Self-similarity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents an effective identification method for DDoS attacks and flash crowd in the source-end network. As DDoS attack and flash crowd behavior dramatically increase the number of new (or forged) source IP addresses, the method firstly construct a time series by counting the number of new (or forged) IP addresses in the monitored local area network, and use VTP (variance-time plots) method to verify its self-similarity in normal environments. Then, whittle estimator is used to calculate Hurst index and its confidence interval to detect anomalies. Based on the detection results, in order to accurately identify these two network behaviors, the paper further proposes Renyi entropy based method to distinguish DDoS attack from flash crowd according to the characteristic that DDoS attack and flash crowd cause different degrees of dispersion in source IP address. Finally experimental results indicate that this method can not only detect the mutation of network traffic in real time and reduce false positives, but also accurately distinguish DDoS attack from flash crowd in the background of large network traffic.
引用
收藏
页码:7188 / 7194
页数:7
相关论文
共 19 条
[1]   Periodicity-Based Anomalies in Self-Similar Network Traffic Flow Measurements [J].
Akgul, Tayfun ;
Baykut, Suleyman ;
Erol-Kantarci, Melike ;
Oktug, Sema F. .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2011, 60 (04) :1358-1366
[2]  
[Anonymous], 2013, AFRICAN J COMPUT ICT
[3]   Detection of DDoS attacks and flash events using information theory metrics-An empirical investigation [J].
Behal, Sunny ;
Kumar, Krishan .
COMPUTER COMMUNICATIONS, 2017, 103 :18-28
[4]   Detection of DDoS attacks and flash events using novel information theory metrics [J].
Behal, Sunny ;
Kumar, Krishan .
COMPUTER NETWORKS, 2017, 116 :96-110
[5]   Modelling Web-server Flash Events [J].
Bhatia, Sajal ;
Mohay, George ;
Schmidt, Desmond ;
Tickle, Alan .
2012 11TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2012, :79-86
[6]   Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform [J].
Cheng, Xiaorong ;
Xie, Kun ;
Wang, Dong .
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, :710-713
[7]  
Chengxu Ye, 2011, Proceedings of the 2011 International Conference on Computer Science and Network Technology (ICCSNT), P310, DOI 10.1109/ICCSNT.2011.6181964
[8]   A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds [J].
Elhadef, Mourad .
ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURE INFORMATION TECHNOLOGY, VOL 2, 2016, 354 :17-23
[9]  
Houssain K., 2002, P 27 ANN IEEE C LOC, P160
[10]  
Jung J., 2002, WWW 02, P293, DOI DOI 10.1145/511446.511485