DDoS Flood Attack Detection Based On Fractal Parameters

被引:0
|
作者
Xia, Zhengmin [1 ]
Lu, Songnian [2 ]
Li, Jianhua [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Dept Elect Engn, Shanghai, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
network security; DDoS flood attack; statistical anomaly detection; change point detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed denial-of-service (DDoS) flood attack is one of the most popular techniques taken by the hackers to threaten the availability and stability of the Internet. To ensure network usability and reliability, accurate detection of this kind of attack is critical. In this paper, we propose a statistical DDoS flood attack detection method by passively monitoring the abrupt change of network traffic fractal parameters: fractal dimension D and Hurst parameter H. Specifically, we use an autoregressive system to estimate the parameters D and H of normal traffic which are slow changing. If the actual parameters D and H vary significantly from the estimation ones, we assume DDoS flood attack happens. Meanwhile, we propose a maximum likelihood estimate-based detection method to determine the change point of parameters D and H that indicate the occurrence of DDoS flood attack. The test results based on the DARPA intrusion detection evaluation data sets show that both the parameters D and H can indicate the DDoS flood attack effectively.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] DDoS attack detection and wavelets
    Li, L
    Lee, G
    ICCCN 2003: 12TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2003, : 421 - 427
  • [22] Design of TCP SYN Flood DDoS Attack Detection Using Artificial Immune Systems
    Ramadhan, Gilang
    Kurniawan, Yusuf
    Kim, Chang-Soo
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON SYSTEM ENGINEERING AND TECHNOLOGY (ICSET), 2016, : 72 - 76
  • [23] DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks
    Dong, Shi
    Sarem, Mudar
    IEEE ACCESS, 2020, 8 : 5039 - 5048
  • [24] CHOOSING PARAMETERS FOR DETECTING DDOS ATTACK
    Pu, Shi
    2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 239 - 242
  • [25] DDA: An Approach to Handle DDoS (Ping Flood) Attack
    Yadav, Virendra Kumar
    Trivedi, Munesh Chandra
    Mehtre, B. M.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 11 - 23
  • [26] DDoS-MSCT: A DDoS Attack Detection Method Based on Multiscale Convolution and Transformer
    Wang, Bangli
    Jiang, Yuxuan
    Liao, You
    Li, Zhen
    IET INFORMATION SECURITY, 2024, 2024
  • [27] DDoS Attack Detection Method Based on Fractional Fourier Transform
    Chen Shi-wen
    Wu Jiang-xing
    Guo Tong
    Lan Ju-long
    2012 THIRD INTERNATIONAL CONFERENCE ON THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (ICTMF 2012), 2013, 38 : 250 - 255
  • [28] FLDDoS: DDoS Attack Detection Model based on Federated Learning
    Zhang, Jiachao
    Yu, Peiran
    Qi, Le
    Liu, Song
    Zhang, Haiyu
    Zhang, Jianzhong
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 635 - 642
  • [29] DDoS attack detection method based on LSTM traffic prediction
    Cheng J.
    Luo Y.
    Tang X.
    Ou M.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2019, 47 (04): : 32 - 36
  • [30] DDoS ATTACK DETECTION METHODS BASED ON DEEP LEARNING IN HEALTHCARE
    Wang, Chaoying
    Zhu, Ting
    JOURNAL OF MECHANICS IN MEDICINE AND BIOLOGY, 2023, 23 (04)