Filtration model for the detection of malicious traffic in large-scale networks

被引:22
作者
Ahmed, Abdulghani Ali [1 ]
Jantan, Aman [2 ]
Wan, Tat-Chee [2 ]
机构
[1] Univ Malaysia Pahang, Fac Comp Syst & Software Engn, Pahang, Malaysia
[2] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
关键词
ECN; Malicious traffic; QoS regulations; SLA guarantees; User violations; SERVICE; QOS; PERFORMANCE; MARKING;
D O I
10.1016/j.comcom.2015.10.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study proposes a capable, scalable, and reliable edge-to-edge model for filtering malicious traffic through real-time monitoring of the impact of user behavior on quality of service (QoS) regulations. The model investigates user traffic, including that injected through distributed gateways and that destined to gateways that are experiencing actual attacks. Misbehaving traffic filtration is triggered only when the network is congested, at which point burst gateways generate an explicit congestion notification (ECN) to misbehaving users. To investigate the behavior of misbehaving user traffic, packet delay variation (PDV) ratios are actively estimated and packet transfer rates are passively measured at a unit time. Users who exceed the PDV bit rates specified in their service level agreements (SLAs) are filtered as suspicious users. In addition, suspicious users who exceed the SLA bandwidth bit rates are filtered as network intruders. Simulation results demonstrate that the proposed model efficiently filters network traffic and precisely detects malicious traffic. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:59 / 70
页数:12
相关论文
共 48 条
[1]   Effective RED: An algorithm to improve RED's performance by reducing packet loss rate [J].
Abbasov, Babek ;
Korukoglu, Serdar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (03) :703-709
[2]  
AHMED AA, 2010, JDCTA, V4, P122
[3]   Real-Time Detection of Intrusive Traffic in QoS Network Domains [J].
Ahmed, Abdulghani Ali ;
Jantan, Aman ;
Wan, Tat-Chee .
IEEE SECURITY & PRIVACY, 2013, 11 (06) :45-53
[4]   Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse [J].
Ahmed, Abdulghani Ali ;
Jantan, Aman ;
Rasmi, Mohammed .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (02) :218-237
[5]   SLA-based complementary approach for network intrusion detection [J].
Ahmed, Abdulghani Ali ;
Jantan, Aman ;
Wan, Tat-Chee .
COMPUTER COMMUNICATIONS, 2011, 34 (14) :1738-1749
[6]  
Ahsan H., 2004, EDGE TO EDGE MEASURE, V44, P211
[7]   Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion Detection [J].
Al-Jarrah, O. Y. ;
Siddiqui, A. ;
Elsalamouny, M. ;
Yoo, P. D. ;
Muhaidat, S. ;
Kim, K. .
2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2014, :177-181
[8]  
An G, 2006, LECT NOTES COMPUT SC, V4318, P182
[9]  
Andersen D., 2001, Operating Systems Review, V35, P131, DOI 10.1145/502059.502048
[10]  
[Anonymous], 2010, INT J COMPUTER SCI C