DDoS attack detection and wavelets

作者: L. Li , G. Lee

DOI: 10.1109/ICCCN.2003.1284203

关键词: Computer scienceDenial-of-service attackComputer networkAnomaly (natural sciences)Spike (software development)Range (statistics)Identification (information)Internet trafficWaveletReal-time computingThe Internet

摘要: … We utilize energy distribution based on wavelet analysis to detect DDoS attack traffic. … the traffic keeps its behavior over time (ie attack-free situation) while an introduction of attack traffic …

参考文章(23)
Nong Ye, A Markov Chain Model of Temporal Behavior for Anomaly Detection information assurance and security. ,(2000)
Ronn Ritke, Xiaoyan Hong, Mario Gerla, Contradictory relationship between Hurst parameter and queueing performance (extended version) Telecommunication Systems. ,vol. 16, pp. 159- 175 ,(2001) , 10.1023/A:1009063114616
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
D. Senie, P. Ferguson, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing RFC 2827-BCP 38. ,vol. 2267, pp. 1- 10 ,(1998)
I. Daubechies, The wavelet transform, time-frequency localization and signal analysis IEEE Transactions on Information Theory. ,vol. 36, pp. 961- 1005 ,(1990) , 10.1109/18.57199
David Moore, Colleen Shannon, k claffy, Code-Red: a case study on the spread and victims of an internet worm acm special interest group on data communication. pp. 273- 284 ,(2002) , 10.1145/637201.637244
R.K.C. Chang, Defending against flooding-based distributed denial-of-service attacks: a tutorial IEEE Communications Magazine. ,vol. 40, pp. 42- 51 ,(2002) , 10.1109/MCOM.2002.1039856
P. Abry, D. Veitch, Wavelet analysis of long-range-dependent traffic IEEE Transactions on Information Theory. ,vol. 44, pp. 2- 15 ,(1998) , 10.1109/18.650984
W.E. Leland, M.S. Taqqu, W. Willinger, D.V. Wilson, On the self-similar nature of Ethernet traffic (extended version) IEEE ACM Transactions on Networking. ,vol. 2, pp. 1- 15 ,(1994) , 10.1109/90.282603
Kihong Park, Heejo Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack international conference on computer communications. ,vol. 1, pp. 338- 347 ,(2001) , 10.1109/INFCOM.2001.916716