DocumentCode
3570864
Title
DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring
Author
Zargar, Saman Taghavi ; Joshi, James ; Tipper, David
Author_Institution
Sch. of Inf. Sci., Univ. of Pittsburgh Pittsburgh, Pittsburgh, PA, USA
fYear
2014
Firstpage
120
Lastpage
129
Abstract
The success in detecting Distributed Denial of Service (DDoS) flooding attacks is highly dependent on the quality and quantity of the covered flows by the traffic monitoring mechanism that is employed in any DDoS defense mechanism. In this paper, we propose DiCoTraM, a DDoS flooding attack tailored distributed and coordinated traffic monitoring mechanism that centrally and periodically coordinates the monitoring responsibilities and distributes them among all the monitoring devices within each autonomous system (AS) while satisfying the monitoring devices´ memory constraints. DiCoTraM monitors traffic flows in such a way that the flows intended for the same destination (possible network/transport level DDoS flooding attack flows) are analyzed together in the same monitoring device if there is enough memory to cover those flows on the monitoring device; hence, this can enable distributed detection mechanisms in place to analyze the monitored flows. The enabled distributed detection leads to reduced communication overhead that is a problem in centralized detection mechanisms as they need to collect centrally all the flows for analysis. Moreover, the centralized coordination structure of DiCoTraM eliminates the redundant flow monitoring among the routers. We simulate and compare DiCoTraM with other traffic monitoring mechanisms in terms of: the overall flow coverage, and the DDoS flooding attack flow coverage. The experimental results show that DiCoTraM, compared to other monitoring mechanisms, covers more DDoS flooding attack flows and it has reasonable overall flow coverage.
Keywords
computer network security; telecommunication traffic; AS; DDoS defense mechanism; DiCoTraM; autonomous system; centralized detection mechanisms; coordinated DDoS flooding attack; device memory constraints; distributed DDoS flooding attack; distributed denial of service; distributed detection mechanisms; flow coverage; reduced communication overhead; traffic monitoring; Educational institutions; IP networks; Monitoring; Ports (Computers); Random access memory; Silicon; Topology;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on
Type
conf
DOI
10.1109/IRI.2014.7051881
Filename
7051881
Link To Document