Skip to main content

Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network

  • Conference paper
Book cover Cryptology and Network Security (CANS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4301))

Included in the following conference series:

Abstract

DDoS (Distributed Denial-of-Service) attacks detection system deployed in source-end network is superior in detection and prevention than that in victim network, because it can perceive and throttle attacks before data flow to Internet. However, the current existed works in source-end network lead to a high false-positive rate and false-negative rate for the reason that they are based on single-feature, and they couldn’t synthesize multi-features simultaneously. This paper proposes a novel approach using Multi-stream Fused Hidden Markov Model (MF-HMM) on source-end DDoS detection for integrating multi-features simultaneously. The multi-features include the S-D-P feature, TCP header Flags, and IP header ID field. Through experiments, we compared our original approach based on multiple detection feature with other main algorithms (such as CUSUM and HMM) based on single-feature. The results present that our approach effectively reduces false-positive rate and false-negative rate, and improve the precision of detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jelena, M.: D-WARD. Source-End Defense Against Distributed Denial-of-Service Attacks, CSD of UCLA, pp. 101–125 (2003)

    Google Scholar 

  2. Kang, J., Zhang, Z., Ju, J.-b.: Protect e-commerce against DDoS attacks with improved D-WARD detection system. In: IEEE International Conference on e-Technology, e-Commerce and e-Service, Hong Kong (April 2005)

    Google Scholar 

  3. Peng, T., Leckie, C., Ramamohanarao, K.: Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol. 3042, pp. 771–782. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Zhou, D., Zhang, H.: A DDoS Attack Detection Method Based on Hidden Markov Model. Journal of Computer Research and Development 42, 1594–1599 (2005)

    Article  Google Scholar 

  5. Moore, D., Voelker, G., Savage, S.: Inferring internet denial-of-service activity. In: The 10th USENIX Security Symposium, Washington (2001)

    Google Scholar 

  6. Chang-Han, J., Shiuh-Pyng, S.: Detecting Distributed DoS/Scanning by Anomaly Distribution of Packet Fields. In: International Computer Symposium 2002 (2002)

    Google Scholar 

  7. Zeng, Z., Tu, J.: Pianfetti: Audio-visual affect recognition through multi-stream fused HMM for HCI. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition (June 2005)

    Google Scholar 

  8. Pan, H., Levinson, S., Huang, T.S., Liang, Z.P.: A fused Hidden Markov Model With Application to Bimodal Speech Processing. IEEE Transaction on Signal Processing 52(3), 573–581 (2004)

    Article  MathSciNet  Google Scholar 

  9. Brand, M., Oliver, N.: Coupled hidden Markov models for complex action recognition. Computer Vision Pattern Recognition, 201–206 (1997)

    Google Scholar 

  10. Saul, L.K., Jordan, M.I.: Mixed memory Markov model: Decomposing complex stochastic processes as mixture of simpler ones. Machine Learning 37, 75–88 (1999)

    Article  MATH  Google Scholar 

  11. Rabiner, L.R.: A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proceedings of IEEE 77(2) (February 1989)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kang, J., Zhang, Y., Ju, Jb. (2006). Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network. In: Pointcheval, D., Mu, Y., Chen, K. (eds) Cryptology and Network Security. CANS 2006. Lecture Notes in Computer Science, vol 4301. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11935070_24

Download citation

  • DOI: https://doi.org/10.1007/11935070_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49462-1

  • Online ISBN: 978-3-540-49463-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics