DocumentCode :
3570864
Title :
DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring
Author :
Zargar, Saman Taghavi ; Joshi, James ; Tipper, David
Author_Institution :
Sch. of Inf. Sci., Univ. of Pittsburgh Pittsburgh, Pittsburgh, PA, USA
fYear :
2014
Firstpage :
120
Lastpage :
129
Abstract :
The success in detecting Distributed Denial of Service (DDoS) flooding attacks is highly dependent on the quality and quantity of the covered flows by the traffic monitoring mechanism that is employed in any DDoS defense mechanism. In this paper, we propose DiCoTraM, a DDoS flooding attack tailored distributed and coordinated traffic monitoring mechanism that centrally and periodically coordinates the monitoring responsibilities and distributes them among all the monitoring devices within each autonomous system (AS) while satisfying the monitoring devices´ memory constraints. DiCoTraM monitors traffic flows in such a way that the flows intended for the same destination (possible network/transport level DDoS flooding attack flows) are analyzed together in the same monitoring device if there is enough memory to cover those flows on the monitoring device; hence, this can enable distributed detection mechanisms in place to analyze the monitored flows. The enabled distributed detection leads to reduced communication overhead that is a problem in centralized detection mechanisms as they need to collect centrally all the flows for analysis. Moreover, the centralized coordination structure of DiCoTraM eliminates the redundant flow monitoring among the routers. We simulate and compare DiCoTraM with other traffic monitoring mechanisms in terms of: the overall flow coverage, and the DDoS flooding attack flow coverage. The experimental results show that DiCoTraM, compared to other monitoring mechanisms, covers more DDoS flooding attack flows and it has reasonable overall flow coverage.
Keywords :
computer network security; telecommunication traffic; AS; DDoS defense mechanism; DiCoTraM; autonomous system; centralized detection mechanisms; coordinated DDoS flooding attack; device memory constraints; distributed DDoS flooding attack; distributed denial of service; distributed detection mechanisms; flow coverage; reduced communication overhead; traffic monitoring; Educational institutions; IP networks; Monitoring; Ports (Computers); Random access memory; Silicon; Topology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on
Type :
conf
DOI :
10.1109/IRI.2014.7051881
Filename :
7051881
Link To Document :
بازگشت