A TRAFFIC COHERENCE ANALYSIS MODEL FOR DDOS ATTACK DETECTION

被引:0
|
作者
Rahmani, Hamza [1 ]
Sahli, Nabil [1 ]
Kammoun, Farouk [1 ]
机构
[1] Natl Sch Comp Sci, CRISTAL Lab, Manouba 2010, Tunisia
来源
SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2009年
关键词
Distributed denial of service; Probability distribution; Joint probability; Stochastic process; Central limit theorem;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed Denial of Service (DDoS) attack is a critical threat to the Internet by severely degrading its performance. DDoS attack can be considered a system anomaly or misuse from which abnormal behaviour is imposed on network traffic. Network traffic characterization with behaviour modelling could be a good indication of attack detection witch can be performed via abnormal behaviour identification. In this paper, we will focus on the design and evaluation of the statistically automated attack detection. Our key idea is that contrary to DDoS traffic, flash crowd is characterized by a large increase not only in the number of packets but also in the number of IP connexions. The joint probability between the packet arrival process and the number of IP connexions process presents a good estimation of the degree of coherence between these two processes. Statistical distances between an observation and a reference time windows are computed for joint probability values. We show and illustrate that anomalously large values observed on these distances betray major changes in the statistics of Internet time series and correspond to the occurrences of illegitimate anomalies.
引用
收藏
页码:148 / 154
页数:7
相关论文
共 50 条
  • [31] Cloud-based DDoS attack detection and defence system using statistical approach
    Devi B.S.K.
    Subbulakshmi T.
    International Journal of Information and Computer Security, 2019, 11 (4-5) : 447 - 475
  • [32] Advanced DDoS Attack Classification using Ensemble Model with Meta-Learner
    Kumar, Ankith Indra
    Ishigaki, Genya
    2024 33RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, ICCCN 2024, 2024,
  • [33] Dual-Level Attack Detection, Characterization and Response for Networks Under DDoS Attacks
    Sardana, Anjali
    Joshi, Ramesh C.
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2011, 3 (01) : 1 - 20
  • [34] DDoS Attack Detection Using Three-State Partition Based on Flow Interaction
    Cheng, Jieren
    Zhang, Boyun
    Yin, Jianping
    Liu, Yun
    Cai, Zhiping
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 176 - +
  • [35] Detection of DDoS Attack in IoT Networks Using Sample Selected RNN-ELM
    Hariprasad, S.
    Deepa, T.
    Bharathiraja, N.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03) : 1425 - 1440
  • [36] DDoS attack detection method based on network abnormal behaviour in big data environment
    Chen, Jing
    Tang, Xiangyan
    Cheng, Jieren
    Wang, Fengkai
    Xu, Ruomeng
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 23 (01) : 22 - 30
  • [37] Hifoots: A Highly Efficient DDoS Attack Detection Scheme Deployed in Smart IoT Homes
    Wang, Yipeng
    Zhang, Xintong
    Lai, Yingxu
    Zhao, Zijian
    Deng, Yongjian
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2025, 11 (01) : 519 - 533
  • [38] DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning
    Sanjalawe, Yousef
    Althobaiti, Turke
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (02): : 3571 - 3588
  • [39] DDoS: Design, implementation and analysis of automated model
    Tupakula, Udaya Kiran
    Varadharajan, Vijay
    Gajam, Ashok Kumar
    Vuppala, Sunil Kumar
    Rao, Pandalaneni Naga Srinivasa
    International Journal of Wireless and Mobile Computing, 2007, 2 (01) : 72 - 85
  • [40] On Capturing DDoS Traffic Footprints on the Internet
    Shi, Lumin
    Li, Jun
    Zhang, Mingwei
    Reiher, Peter
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2755 - 2770