DDoS Flood Attack Detection Based On Fractal Parameters

被引:0
|
作者
Xia, Zhengmin [1 ]
Lu, Songnian [2 ]
Li, Jianhua [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Dept Elect Engn, Shanghai, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
network security; DDoS flood attack; statistical anomaly detection; change point detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed denial-of-service (DDoS) flood attack is one of the most popular techniques taken by the hackers to threaten the availability and stability of the Internet. To ensure network usability and reliability, accurate detection of this kind of attack is critical. In this paper, we propose a statistical DDoS flood attack detection method by passively monitoring the abrupt change of network traffic fractal parameters: fractal dimension D and Hurst parameter H. Specifically, we use an autoregressive system to estimate the parameters D and H of normal traffic which are slow changing. If the actual parameters D and H vary significantly from the estimation ones, we assume DDoS flood attack happens. Meanwhile, we propose a maximum likelihood estimate-based detection method to determine the change point of parameters D and H that indicate the occurrence of DDoS flood attack. The test results based on the DARPA intrusion detection evaluation data sets show that both the parameters D and H can indicate the DDoS flood attack effectively.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Detection and analysis types of DDoS attack
    Navruzov, Erkin
    Kabulov, Anvar
    2022 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2022, : 203 - 209
  • [42] A novel DDoS attack detection method
    Liu, Y. (zhujq@jlu.edu.cn), 2013, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [43] DeepDDoS: Online DDoS Attack Detection
    Shi, Zhenping
    Li, Jie
    Wu, Chentao
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [44] A convenient way to mitigate DDoS TCP SYN flood attack
    Toyeer-E-Ferdoush
    Rahman, Habibur
    Hasan, Mahmud
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (07): : 2069 - 2077
  • [45] An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks
    Shojaei, Maryam
    Movahhedinia, Naser
    Ladani, Behrouz Tork
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 129 - 143
  • [46] DDoS Attack Intrusion Detection System Based on Hybridization of CNN and LSTM
    Issa, Ahmet Sardar Ahmed
    Albayrak, Zafer
    ACTA POLYTECHNICA HUNGARICA, 2023, 20 (02) : 105 - 123
  • [47] Edge DDoS Attack Detection Method Based on Software Defined Networks
    Ren, Gangsheng
    Zhang, Yang
    Zhang, Shukui
    Long, Hao
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT I, 2022, 13155 : 597 - 611
  • [48] Router Based Detection for Low-Rate Agents of DDoS Attack
    Nashat, Dalia
    Jiang, Xiaohong
    Horiguchi, Susumu
    2008 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (HPSR), 2008, : 83 - 88
  • [49] Chronos: DDoS Attack Detection Using Time-Based Autoencoder
    Salahuddin, Mohammad A.
    Pourahmadi, Vahid
    Alameddine, Hyame Assem
    Bari, Md Faizul
    Boutaba, Raouf
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (01): : 627 - 641
  • [50] Ontology-based Modeling of DDoS Attacks for Attack Plan Detection
    Ansarinia, Morteza
    Asghari, Seyyed Amir
    Souzani, Afshin
    Ghaznavi, Ahmadreza
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 993 - 998