Parametric Differences between a Real-world Distributed Denial-of-Service Attack and a Flash Event

作者: Sajal Bhatia , George Mohay , Alan Tickle , Ejaz Ahmed , None

DOI: 10.1109/ARES.2011.39

关键词:

摘要: Distributed Denial-of-Service (DDoS) attacks continue to be one of the most pernicious threats delivery services over Internet. Not only are DDoS present in many guises, they also continuously evolving as new vulnerabilities exploited. Hence accurate detection these still remains a challenging problem and necessity for ensuring high-end network security. An intrinsic challenge addressing this is effectively distinguish from similar looking Flash Events (FEs) created by legitimate clients. A considerable overlap between general characteristics FEs makes it difficult precisely separate two classes Internet activity. In paper we propose parameters which can used explicitly analyse real-world publicly available datasets validate our proposal. Our analysis shows that even though appear very attacks, there several subtle dissimilarities exploited events.

参考文章(25)
Fabian Monrose, Jay Zarfoss, Moheeb Abu Rajab, Andreas Terzis, My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging conference on workshop on hot topics in understanding botnets. pp. 5- 5 ,(2007)
Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao, Protection from distributed denial of service attacks using history-based IP filtering international conference on communications. ,vol. 1, pp. 482- 486 ,(2003) , 10.1109/ICC.2003.1204223
Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H Deng, None, Distinguishing between FE and DDoS Using Randomness Check Lecture Notes in Computer Science. pp. 131- 145 ,(2008) , 10.1007/978-3-540-85886-7_9
João B. D. Cabrera, Lundy Lewis, Xinzhou Qin, Wenke Lee, Raman K. Mehra, Proactive Intrusion Detection and Distributed Denial of Service Attacks—A Case Study in Security Management Journal of Network and Systems Management. ,vol. 10, pp. 225- 254 ,(2002) , 10.1023/A:1015910917349
Yi Xie, Shun-Zheng Yu, Detecting Shrew HTTP Flood Attacks for Flash Crowds international conference on conceptual structures. pp. 640- 647 ,(2007) , 10.1007/978-3-540-72584-8_85
Ejaz Ahmed, George Mohay, Alan Tickle, Sajal Bhatia, None, Use of IP Addresses for High Rate Flooding Attack Detection information security conference. pp. 124- 135 ,(2010) , 10.1007/978-3-642-15257-3_12
Quyen Le, Marat Zhanikeev, Yoshiaki Tanaka, Methods of Distinguishing Flash Crowds from Spoofed DoS Attacks next generation internet. pp. 167- 173 ,(2007) , 10.1109/NGI.2007.371212
Jaeyeon Jung, Balachander Krishnamurthy, Michael Rabinovich, Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites the web conference. pp. 293- 304 ,(2002) , 10.1145/511446.511485
Yifu Feng, Rui Guo, Dongqi Wang, Bencheng Zhang, Research on the Active DDoS Filtering Algorithm Based on IP Flow international conference on natural computation. ,vol. 4, pp. 628- 632 ,(2009) , 10.1109/ICNC.2009.550
Luis von Ahn, Manuel Blum, John Langford, Telling humans and computers apart automatically Communications of the ACM. ,vol. 47, pp. 56- 60 ,(2004) , 10.1145/966389.966390