DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks

被引:9
作者
Boro, Debojit [1 ]
Bhattacharyya, Dhruba K. [1 ]
机构
[1] Tezpur Univ, Dept Comp Sci & Engn, Tezpur 784028, India
来源
MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS | 2017年 / 23卷 / 03期
关键词
Learning systems - Quality of service - Denial-of-service attack - Floods - Network security;
D O I
10.1007/s00542-016-2978-0
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
High-rate distributed denial of service (HDDoS) flooding attacks pose as a major threat to the Internet. Most present solutions based on machine learning approach are inept for detecting the attacks in real time due to high processing overhead. In this paper, we present a defense solution referred to as DyProSD that combines both the merits of feature-based and statistical approach to handle HDDoS flooding attacks. The statistical module marks the suspicious traffic and forwards to an ensemble of classifiers for ascertaining the traffic as malicious or normal. Our method filters the attack traffic protocol specifically by allocating various protocol specific filter engines dynamically. As and when DDoS attack occurs and the load of a filter engine reaches beyond its capable limit, a new filter engine is recruited dynamically from the idle resource pool for filtering, thus guaranteeing the quality of service for legitimate users concurrently. We establish the effectiveness of DyProSD through several experimental analysis and real-world dataset experiments and the results indicate enough confidence in favour of our solution.
引用
收藏
页码:593 / 611
页数:19
相关论文
共 28 条
[1]  
Ahmed E, 2010, IFIP ADV INF COMM TE, V330, P124
[2]  
[Anonymous], 2007, CAIDA DDOS ATT 2007
[3]   DISTANCE MEASURES FOR SIGNAL-PROCESSING AND PATTERN-RECOGNITION [J].
BASSEVILLE, M .
SIGNAL PROCESSING, 1989, 18 (04) :349-369
[4]  
Bhattacharyya D. K., 2013, Network Anomaly Detection: A Machine Learning Perspective
[5]  
Boro Debojit, 2015, International Journal of Innovative Computing and Applications, V6, P145
[6]  
CAIDA, 2013, CAIDA AN INT TRAC 20
[7]  
Chen Y., 2008, International Journal of Network Security, V7, P70
[8]  
Dietrich S, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FOURTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIV), P329
[9]  
Haiqin Liu, 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC 2011), P287, DOI 10.1109/CCNC.2011.5766474
[10]  
Highleyman WH, 2013, SURVIVING DNS DDOS A