Router Based Detection for Low-Rate Agents of DDoS Attack

被引:0
作者
Nashat, Dalia [1 ]
Jiang, Xiaohong [1 ]
Horiguchi, Susumu [1 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 980, Japan
来源
2008 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (HPSR) | 2008年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The TCP SYN flooding attack is the most prevalent type of DDoS attacks that exhaust network resources. The current detection schemes only work well for the detection of high-rate flooding sources. It is notable, however, that in the current DDoS attacks, the flooding rate is usually distributed among many low-rate flooding agents to make the detection more difficult. Therefore, a more sensitive and fast detection scheme is highly desirable for the efficient detection of these low-rate flooding sources. In this paper, we focus on the low-rate agent and propose a router-based detection scheme for it. The proposed scheme is based on the TCP SYN-SYN/ACK protocol pair with the consideration of packet header information (both sequence and Ack. numbers). To make our scheme more sensitive and generally applicable, the Counting Bloom Filter is used to avoid the effect of SMACK retransmission and the Change Point Detection method is applied to avoid the dependence of detection on sites and access patterns. Extensive trace-driven simulation has been conducted to demonstrate the efficiency of the proposed scheme in terms of its detection probability and also average detection time.
引用
收藏
页码:83 / 88
页数:6
相关论文
共 21 条
[1]   An efficient filter for denial-of-service bandwidth attacks [J].
Abdelsayed, S ;
Glimsholt, D ;
Leckie, C ;
Ryan, S ;
Shami, S .
GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, :1353-1357
[2]  
[Anonymous], INTERNET TRAFFIC ARC
[3]  
[Anonymous], P ACM SIGCOMM SAN DI
[4]  
Basseville M., 1993, DETECTION ABRUPT CHA
[5]  
BERNSTEIN DJ, LINUX KERNAL SYN COO
[6]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[7]  
Brodsky BE., 1993, Nonparametric Methods in Change Point Problems
[8]  
*CERT COORD CTR, DEN SERV ATT
[9]   Internet infrastructure security: A taxonomy [J].
Chakrabarti, A ;
Manimaran, G .
IEEE NETWORK, 2002, 16 (06) :13-21
[10]  
CHAN E, 2004, P C ISPAN