D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events

被引:62
作者
Behal, Sunny [1 ]
Kumar, Krishan [2 ]
Sachdeva, Monika [3 ]
机构
[1] IKG Punjab Tech Univ, Kapurthala, Punjab, India
[2] Panjab Univ, UIET, Dept IT, Chandigarh, India
[3] IKG Punjab Tech Univ, Dept CSE, Kapurthala, Punjab, India
关键词
Network security; DDoS attacks; Flash events; Entropy; Information distance; ENTROPY; SYSTEM;
D O I
10.1016/j.jnca.2018.03.024
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the present computer era, though the Internet-based applications are the driving force of social evolution, yet its architectural vulnerabilities proffer plethoric leisure to the attackers for conquering diversity of attacks on its services. Distributed Denial of Service (DDoS) is one of such prominent attack that constitutes a lethal threat to Internet domain that harnesses its computing and communication resources. Despite the presence of enormous defense solutions, ensuring the security and availability of data, resources, and services to end users remains an ongoing research challenge. In addition, the increase in network traffic rates of legitimate traffic and flow similarity of attack traffic with legitimate traffic has further made DDoS problem more crucial. The current research has deployed DDoS defense solutions primarily at the victim-end because of the inherent advantages of easy deployment and availability of complete attack information. However, the huge network traffic volume generated by DDoS attacks and lack of sufficient computational resources at the victim-end makes defense solution itself vulnerable to these attacks. This paper proposes an ISP level distributed, flexible, automated, and collaborative (D-FACE) defense system which not only distributes the computational and storage complexity to the nearest point of presence (PoPs) routers but also leads to an early detection of DDoS attacks and flash events (FEs). The results show that D-FACE defense system outperformed the existing Entropy-based systems on various defense system evaluation metrics.
引用
收藏
页码:49 / 63
页数:15
相关论文
共 46 条
[1]  
Alcorn J.A., 2014, 2014 23 INT C COMPUT, P1
[2]  
[Anonymous], 2016, RECENT DDOS ATTACKS
[3]  
[Anonymous], 2016, CORE EMULATOR
[4]  
[Anonymous], 2015, DETER TESTB
[5]  
[Anonymous], THESIS
[6]   Use of Tsallis entropy in detection of SYN flood DoS attacks [J].
Basicevic, Ilija ;
Ocovaj, Stanislav ;
Popovic, Miroslav .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3634-3640
[7]  
Behal Sunny, 2017, International Journal of Network Security, V19, P734, DOI 10.6633/IJNS.201709.19(5).11
[8]  
Behal S., 2016, INT J NETW SECURITY, V19, P383
[9]  
Behal S., 2016, J COMPUT SCI INF SEC, V14, P323
[10]   Detection of DDoS attacks and flash events using information theory metrics-An empirical investigation [J].
Behal, Sunny ;
Kumar, Krishan .
COMPUTER COMMUNICATIONS, 2017, 103 :18-28