DocumentCode :
1129845
Title :
Information theory based detection against network behavior mimicking DDoS attacks
Author :
Yu, Shui ; Zhou, Wanlei ; Doss, Robin
Author_Institution :
Deakin Univ., Melbourne
Volume :
12
Issue :
4
fYear :
2008
fDate :
4/1/2008 12:00:00 AM
Firstpage :
318
Lastpage :
321
Abstract :
DDoS is a spy-on-spy game between attackers and detectors. Attackers are mimicking network traffic patterns to disable the detection algorithms which are based on these features. It is an open problem of discriminating the mimicking DDoS attacks from massive legitimate network accessing. We observed that the zombies use controlled function(s) to pump attack packages to the victim, therefore, the attack flows to the victim are always share some properties, e.g. packages distribution behaviors, which are not possessed by legitimate flows in a short time period. Based on this observation, once there appear suspicious flows to a server, we start to calculate the distance of the package distribution behavior among the suspicious flows. If the distance is less than a given threshold, then it is a DDoS attack, otherwise, it is a legitimate accessing. Our analysis and the preliminary experiments indicate that the proposed method- can discriminate mimicking flooding attacks from legitimate accessing efficiently and effectively.
Keywords :
entropy; security of data; telecommunication security; telecommunication traffic; information theory-based detection; legitimate accessing; mimicking DDoS attacks; mimicking flooding attacks; network behavior; network traffic patterns; package distribution behavior; spy-on-spy game; Communication system traffic control; Computer crime; Detection algorithms; Detectors; Entropy; Floods; Information theory; Packaging; Surges; Telecommunication traffic;
fLanguage :
English
Journal_Title :
Communications Letters, IEEE
Publisher :
ieee
ISSN :
1089-7798
Type :
jour
DOI :
10.1109/LCOMM.2008.072049
Filename :
4489680
Link To Document :
بازگشت