A Resource Utilization Measurement Detection against DDoS Attacks

被引:0
作者
Chen, Chin-Ling [1 ]
Chen, Hsin-Chiao [2 ]
机构
[1] Natl Pingtung Univ, Dept Informat Management, Pingtung 900, Taiwan
[2] Natl Pingtung Inst Commerce, Dept Informat Management, Pingtung 900, Taiwan
来源
2016 9TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI 2016) | 2016年
关键词
Distributed denial of service; firewall; detection;
D O I
暂无
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
We has proposed a DDoS detection combining rulebased and anomaly-based scheme, in which three types of system resource usage are examined. We first analyze the performance of the proposed system under the conditions imposed by both of the normal traffic and the TFN2K attack. Secondly, we find the minimum cost, such as the saturation time and critical point, for attack traffic to saturate the victim. Thirdly, a thorough investigation on comparison of the proposed scheme and the other well-known schemes is presented. Our analysis and experiments demonstrate that the proposed scheme along with ANOVA can work very well with suitable combination and fine tuning of threshold value.
引用
收藏
页码:1938 / 1943
页数:6
相关论文
共 31 条
[11]  
Liu H., 2011, CCNC 2011 8 IEEE CON, V8
[12]  
Liu L., 2012, 2012 IEEE 11 INT C T
[13]  
Liu Y., 2012, IEEE INFOCOM 2012 31, V31
[14]  
Lua R.-P., 2014, CCNC 2014 11 IEEE CO, V11
[15]  
Purwanto Y., 2014, 2014 8 INT C TEL SYS
[16]  
Rajam V. K. Soundar, 2013, 2013 5 INT C ADV COM
[17]   DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks [J].
Ranjan, Supranamaya ;
Swaminathan, Ram ;
Uysal, Mustafa ;
Nucci, Antonio ;
Knightly, Edward .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (01) :26-39
[18]  
Rontti T., 2012, IEEE COMMUNICATIONS, V50
[19]  
Sadre R., 2012, NOMS 2012 13 IEEE IF, V13
[20]  
Salah Khaled, 2012, IEEE T NETWORK SERVI, V9