• DocumentCode
    1785780
  • Title

    An efficient sketch-based framework to identify multiple heavy-hitters and its application in DoS detection

  • Author

    Dashti, Sadegh ; Berenjkoub, Mehdi ; Tahmasbi, Ashraf

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Isfahan Univ. of Technol., Isfahan, Iran
  • fYear
    2014
  • fDate
    20-22 May 2014
  • Firstpage
    1113
  • Lastpage
    1118
  • Abstract
    Nowadays, with the increasing speed of communication links and generated traffic volume, Network Intrusion Detection Systems (NIDSs) encounter new challenges. NIDSs inspect all packets to find attacks and abnormal behaviors. In addition, NIDSs keep the state of each flow to increase accuracy of detection. Performing packet inspection in today´s high-speed networks is hard, or even impossible and keeping per flow state is not scalable. Large-scale attacks such as DoS attack usually produce many flows and keeping their state requires many resources. Consequently, approaches that investigate behavior of communication patterns in flow-level - instead of packet inspection - are taken into consideration. Different algorithms and techniques have been proposed for flow-based detection of DoS attacks. Recently, approaches based on data streaming algorithms have attracted much attention. These algorithms enable the analysis and processing of large data sets by constructing a compact synopsis of input data. This synopsis can be used to answer certain queries over the original data. Sketch is one of these synopsis structures which different intrusion detection systems are proposed by using it. Most of these proposed approaches have good performance if just one flow has anomalous characteristics. But if there are several abnormal flows, sketches encounter difficulties. This paper for the first time provides a framework to avoid such problems in presence of several abnormal flows. The proposed framework rearranges hash functions in an appropriate data structures and overcomes such problems in presence of several abnormal flows.
  • Keywords
    computer network security; data structures; query processing; DoS attack; DoS detection application; NIDS; anomalous characteristic; communication link; compact data synopsis; data set processing; data streaming algorithm; data structure; flow-based detection; hash function; high-speed network; multiple heavy-hitter identification; network intrusion detection system; packet inspection; per flow state; query answering; sketch-based framework efficiency; Algorithm design and analysis; Approximation algorithms; Approximation methods; Computer crime; High-speed networks; Intrusion detection; Radiation detectors; DoS attack; Sketch; heavy hitter; intrusion detection; related counters;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electrical Engineering (ICEE), 2014 22nd Iranian Conference on
  • Conference_Location
    Tehran
  • Type

    conf

  • DOI
    10.1109/IranianCEE.2014.6999702
  • Filename
    6999702