Predicting Number of Zombies in a DDoS Attacks Using Isotonic Regression

作者: B. B. Gupta , Nadeem Jamali

DOI: 10.1007/978-94-007-6359-3_8

关键词:

摘要: Anomaly based DDoS detection systems construct profile of the traffic normally seen in network, and identify anomalies whenever deviate from normal beyond a threshold. This deviation threshold is used past for but not finding number zombies. chapter presents an approach that utilizes this to predict zombies using isotonic regression model. A relationship established between observed sample entropy. Internet type topologies simulation are generated Transit-Stub model GT-ITM topology generator. NS-2 network simulator on Linux platform as test bed launching attacks with varied Various statistical performance measures measure The results promising we able efficiently very less error rate

参考文章(33)
Jarmo Mölsä, Mitigating denial of service attacks: a tutorial Journal of Computer Security. ,vol. 13, pp. 807- 837 ,(2005) , 10.3233/JCS-2005-13601
David A. Freedman, Statistical Models: Theory and Practice ,(2005)
Vern Paxson, Bro: a system for detecting network intruders in real-time Computer Networks. ,vol. 31, pp. 2435- 2463 ,(1999) , 10.1016/S1389-1286(99)00112-7
Manoj Misra, Brij B. Gupta, Ramesh C. Joshi, An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach arXiv: Cryptography and Security. ,(2012)
Thomer M. Gil, Massimiliano Poletto, MULTOPS: a data-structure for bandwidth attack detection usenix security symposium. pp. 3- 3 ,(2001) , 10.21236/ADA401819
Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao, Protection from distributed denial of service attacks using history-based IP filtering international conference on communications. ,vol. 1, pp. 482- 486 ,(2003) , 10.1109/ICC.2003.1204223
Chen-Mou Cheng, H.T. Kung, Koan-Sin Tan, Use of spectral analysis in defense against DoS attacks global communications conference. ,vol. 3, pp. 2143- 2148 ,(2002) , 10.1109/GLOCOM.2002.1189011
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
D. Senie, P. Ferguson, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing RFC 2827-BCP 38. ,vol. 2267, pp. 1- 10 ,(1998)