A queue model to detect DDos attacks

被引:0
|
作者
Hao, S [1 ]
Song, H [1 ]
Jiang, WB [1 ]
Dai, YQ [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
关键词
anomaly detection; DDos attacks; quette model; Gaussian mixture model;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of network communication and collaboration, distributed denial-of-service (DDos) attack increasingly becomes one of the hardest and most annoying network security problems to address. In this paper, we present a new framework to detect the DDos attacks according to the packet flows of specific protocols. Our aim is to detect the attacks as early as possible and avoid the unnecessary false positive. A Gaussian parametrical mixture model is utilized to estimate the normal behavior and a queue model is adopted for detecting the attacks. Experiments verify that our proposed approach is effective and has reasonable accuracy.
引用
收藏
页码:106 / 112
页数:7
相关论文
共 50 条
  • [21] RQA Based Approach to Detect and Prevent DDoS Attacks in VoIP Networks
    Jeyanthi, N.
    Thandeeswaran, R.
    Vinithra, J.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2014, 14 (01) : 11 - 24
  • [22] Honeynettrap: Framework to Detect And Mitigate Ddos Attacks using Heterogeneous Honeynet
    Gupta, Alisha
    Gupta, B. B.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 1906 - 1911
  • [23] A distributed approach using entropy to detect DDoS attacks in ISP domain
    Kumar, Krishan
    Joshi, R. C.
    Singh, Kuldip
    2007 INTERNATIONAL CONFERENCE OF SIGNAL PROCESSING, COMMUNICATIONS AND NETWORKING, VOLS 1 AND 2, 2006, : 331 - +
  • [24] Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
    Yan, Ruoyu
    Zheng, Qinghua
    Li, Haifei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (03): : 428 - 451
  • [25] QEMDD: Quantum Inspired Ensemble Model to Detect and Mitigate DDoS Attacks at Various Layers of SDN Architecture
    Saritha, A.
    Reddy, B. Ramasubba
    Babu, A. Suresh
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (03) : 2365 - 2390
  • [26] Probability principle of a reliable approach to detect signs of DDOS flood attacks
    Li, M
    Liu, JG
    Long, DY
    PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 596 - 599
  • [27] An Unsupervised Generative Adversarial Network System to Detect DDoS Attacks in SDN
    Lent, Daniel M. Brandao
    Ruffo, Vitor G. da Silva
    Carvalho, Luiz F.
    Lloret, Jaime
    Rodrigues, Joel J. P. C.
    Proenca Jr, Mario Lemes
    IEEE ACCESS, 2024, 12 : 70690 - 70706
  • [28] A Hybrid Approach to Detect DDoS Attacks Using KOAD and the Mahalanobis Distance
    Daneshgadeh, Salva
    Kemmerich, Thomas
    Ahmed, Tarem
    Baykal, Nazife
    2018 IEEE 17TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2018,
  • [29] Machine Learning Techniques to Detect DDoS Attacks on VANET System: A Survey
    Alrehan, Alia Mohammed
    Al-Haidari, Fahd
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [30] A Simulation Model for the Analysis of DDoS Amplification Attacks
    Furfaro, Angelo
    Malena, Giovanna
    Molina, Lorena
    Parise, Andrea
    2015 17TH UKSIM-AMSS INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2015, : 267 - 272