Title :
DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis
Author :
Wu, Yi-Chi ; Tseng, Huei-Ru ; Yang, Wuu ; Jan, Rong-Hong
Author_Institution :
Dept. of Comput. Sci., Nat. Chiao Tung Univ., Hsinchu, Taiwan
Abstract :
As modern life becomes increasingly closely bound to the Internet, network security becomes increasingly important. Like it or not, we all live under the shadow of network threats. The threats could cause leakage of privacy and/or economic loss. Among network attacks, the DDoS (distributed denial-of-service) attack is one of the most frequent and serious. In a DDoS attack, an attacker first breaks into many innocent computers (called zombies) by taking advantages of known or unknown bugs and vulnerabilities in the software. Then the attacker sends a large number of packets from these already-captured zombies to a server. These packets either occupy a major portion of the server´s network bandwidth or they consume much of the server´s time. The server is then prevented from conducting normal business operations.In order to mitigate the DDoS threat, we design a system to detect DDoS attacks based on a decision-tree technique and, after detecting an attack, to trace back to the approximate locations of the attacker with a traffic-flow pattern-matching technique. We conduct our experiment on the DETER system. According to our experiment results, our system could detect the DDoS attack with the false positive ratio about 1.2% - 2.4%, false negative ratio about 2% - 10% with different kind of attack, attack sending rate and find the attack path in trace back with the false negative rate 8% - 12% and false positive rate 12% - 14%.
Keywords :
computer crime; decision trees; pattern matching; program debugging; DDoS detection; DETER system; bugs; decision tree; distributed denial-of-service attack; grey relational analysis; network threats; traceback; traffic flow pattern matching technique; zombies; Cities and towns; Computer crime; Computer science; Computer security; Decision trees; IP networks; Network servers; Protection; Telecommunication traffic; Traffic control;
Conference_Titel :
Multimedia and Ubiquitous Engineering, 2009. MUE '09. Third International Conference on
Conference_Location :
Qingdao
Print_ISBN :
978-0-7695-3658-3
DOI :
10.1109/MUE.2009.60