DocumentCode :
3264849
Title :
VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification
Author :
Wang, Fei ; Wang, Xiaofeng ; Su, Jinshu ; Xiao, Bin
Author_Institution :
Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
fYear :
2012
fDate :
25-27 June 2012
Firstpage :
215
Lastpage :
222
Abstract :
Flooding based Distributed Denial of Service (DDoS) attacks can cause very serious security problem by exhausting computing and bandwidth resources of victims. To mitigate these destructive attacks, it is crucially important to detect the occurrence of DDoS attacks and identify their targets as early as possible. In this paper, we propose a collaborative DDoS detection system, called VicSifter, which can detect ongoing DDoS attacks and identify victims at an early stage with good scalability and low overhead. VicSifter is deployed over multiple nodes with two kinds of functions: local anomaly detection and collaborative victim identification. The anomaly detection method is performed locally and is lightweight to save computation by measuring passing packets in a sketch. The collaborative victim identification is triggered only when a local anomaly is detected by employing our distinctive elimination mechanism. The mechanism can significantly reduce the number of packets to be processed by each node, making our system scalable for high-speed network links. We evaluate the performance of VicSifter by using real-world data traffic, mixing the real DDoS attack traces with captured campus gateway traffic. The results show that our system has high accuracy in the early detection of DDoS attacks and timely identification of targeted victims. Our system can outperform other existing methods with less space requirement, and thus achieving good system scalability.
Keywords :
computer network performance evaluation; computer network security; internetworking; resource allocation; VicSifter system; bandwidth resources; campus gateway data traffic; collaborative DDoS detection system; computing resources; flooding-based distributed denial of service attacks; high-speed network links; lightweight-collaborative victim identification; local-anomaly detection; overheads; packet measurement; performance evaluation; system scalability; target identification; Accuracy; Collaboration; Computer crime; Detectors; IP networks; Memory management; Resource management; DDoS attacks; collaborative detection; lightweight; victim identification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
Type :
conf
DOI :
10.1109/TrustCom.2012.295
Filename :
6295978
Link To Document :
بازگشت