Validation of Chaos Hypothesis in NADA and Improved DDoS Detection Algorithm

作者: Xinya Wu , Yonghong Chen

DOI: 10.1109/LCOMM.2013.102913.130932

关键词:

摘要: With the growth of Internet, one most common attacks comes in form a distributed denial service attack. In this paper, we validate that prediction error network traffic is chaotic which used NADA algorithm and improve DDoS detection based on NADA. Firstly, paper discusses use largest Lyapunov exponent to chaos hypothesis. Secondly, predict by using an exponential smoothing model instead forecasting method Then analyze theory Back Propagation Neural Network. The experimental results conducted discussed show our can detect up 98.04% accuracy.

参考文章(7)
SooHyung Lee, HyunJu Kim, JungChan Na, JongSu Jang, Abnormal traffic detection and its implementation international conference on advanced communication technology. ,vol. 1, pp. 246- 250 ,(2005) , 10.1109/ICACT.2005.245837
Yonghong Chen, Xinlei Ma, Xinya Wu, DDoS Detection Algorithm Based on Preprocessing Network Traffic Predicted Method and Chaos Theory IEEE Communications Letters. ,vol. 17, pp. 1052- 1054 ,(2013) , 10.1109/LCOMM.2013.031913.130066
Liangyue Cao, Practical method for determining the minimum embedding dimension of a scalar time series Physica D: Nonlinear Phenomena. ,vol. 110, pp. 43- 50 ,(1997) , 10.1016/S0167-2789(97)00118-8
Michael T. Rosenstein, James J. Collins, Carlo J. De Luca, A practical method for calculating largest Lyapunov exponents from small data sets Physica D: Nonlinear Phenomena. ,vol. 65, pp. 117- 134 ,(1993) , 10.1016/0167-2789(93)90009-P
H_S Kim, R Eykholt, JD Salas, None, Nonlinear dynamics, delay times, and embedding windows Physica D: Nonlinear Phenomena. ,vol. 127, pp. 48- 60 ,(1999) , 10.1016/S0167-2789(98)00240-1
G. Carl, G. Kesidis, R.R. Brooks, Suresh Rai, Denial-of-service attack-detection techniques IEEE Internet Computing. ,vol. 10, pp. 82- 89 ,(2006) , 10.1109/MIC.2006.5
Ashley Chonka, Jaipal Singh, Wanlei Zhou, Chaos theory based detection against network mimicking DDoS attacks IEEE Communications Letters. ,vol. 13, pp. 717- 719 ,(2009) , 10.1109/LCOMM.2009.090615