Detecting and tracing DDoS attacks in the traffic analysis using auto regressive model

被引:0
作者
Uchiyama, Y
Waizumi, Y
Kato, N
Nemoto, Y
机构
[1] NTT DATA Corp, Koto Ku, Tokyo, Japan
[2] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 9808579, Japan
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2004年 / E87D卷 / 12期
关键词
DoS; DDoS; tracing; detection; auto regressive model; attack duration time;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, interruption of services large-scale business sites and Root Name Servers caused by Denial-of-Service (DoS) attacks or Distributed DoS (DDoS) attacks has become an issue. Techniques for specifying attackers are, thus important. On the other hand, since information on attackers' source IP addresses are generally spoofed, tracing techniques are required for DoS attacks. In this paper, we predict network traffic volume at observation points on the network, and detect DoS attacks by carefully examining the difference between predicted traffic volume and actual traffic volume. Moreover, we assume that the duration time of an attack is the same at every observation point the attack traffic passes, and propose a tracing method that uses attack duration time as a parameter. We show that our proposed method is effective in tracing DDoS attacks.
引用
收藏
页码:2635 / 2643
页数:9
相关论文
共 17 条
  • [1] [Anonymous], 2000, P 2000 ACM SIGCOMM C
  • [2] Case J.D., 1990, RFC1157
  • [3] Internet infrastructure security: A taxonomy
    Chakrabarti, A
    Manimaran, G
    [J]. IEEE NETWORK, 2002, 16 (06): : 13 - 21
  • [4] Defending against flooding-based distributed denial-of-service attacks: A tutorial
    Chang, RKC
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 42 - 51
  • [5] GIBSON S, DRDOS
  • [6] Gil TM, 2001, USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, P23
  • [7] Jeong JS, 2002, IEICE T COMMUN, VE85B, P972
  • [8] Lau F, 2000, IEEE SYS MAN CYBERN, P2275, DOI 10.1109/ICSMC.2000.886455
  • [9] Moore D, 2001, USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, P9
  • [10] NORTHCUTT S, 2001, ANAL HDB