Skip to main content

Advertisement

Log in

A protocol-free detection against cloud oriented reflection DoS attacks

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Distributed denial of service (DDoS) attack presents a critical threat to cloud infrastructure, where many manipulated hosts flood the victim cloud with plenty of packets, which will lead to the exhaustion of bandwidth and other system resources. As one type of DDoS attack, in reflection DoS (RDoS) attack, legitimate servers (reflectors) are fooled into sending a large number of packets to the victim cloud. Most of the existed RDoS attack detection mechanisms are protocol-specific, thus low in efficiency. It is inspected that because of being triggered by the same attacking flow, intra-unite correlation exists among the packet rate of attacking flows. Based on the phenomenon, a flow correlation coefficient (FCC)-based protocol-free detection (PFD) algorithm is proposed. The simulation results show that PFD can detect attacking flows efficiently and effectively and is not protocol-specific, thus can be used as effective supplement to existed algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • CHKP (2010) Stateful inspection technology (the industry standard for enterprise class network security solutions). http://www.checkpoint.com/products/downloads/Stateful _Inspection

  • Crovella M, Bestavros A (1997) Self-similarity in world wide web traffic: Evidence and possible causes. IEEE/ACM Trans Netw. 5(6):835–846

    Article  Google Scholar 

  • Drakos RN (2002) Application-level reflection attacks. http://www.lemuria.org/security/application-drdos.html

  • Ferguson P (2000) rfc2827:network ingress filtering: defeating denial of service attacks which employ ip source address spoofing

  • Ficco M, Palmieri F (2015) Introducing fraudulent energy consumption in cloud infrastructures: a new generation of denial-of-service attacks. IEEE Syst J 99:1–11

  • Jung J, Krishnamurthy B, Rabinovich M (2002) Flash crowds and denial of service attacks: characterization and implications for cdns and web sites. In: Proc. 11th Intl Conf. World Wide Web (WWW), pp 252–262

  • Kandula S, Katabi D, Jacob M, Berger A (2005) Botz-4-sale: surviving organized ddos attacks that mimic flash crowds. In: Proceedings of the 2nd conference on Symposium on Networked Systems Design, vol 2, pp 287–300

  • Liu Y, Wei W (2015) A replication-based mechanism for fault tolerance in mapreduce framework. Math Probl Eng 2015(1):1–7. http://www.hindawi.com/journals/mpe/2015/408921/

  • Oikonomou G, Mirkovic J (2009) Modeling human behavior for defense against flash-crowd attacks. In: Proc. IEEE Intl Conf. Comm

  • Palmieri F, Ricciardi S, Fiore U (2011) Evaluating network-based dos attacks under the energy consumption perspective: new security issues in the coming green ICT area. International Conference on Broadband. Wireless Computing, Communication and Applications (BWCCA), pp 374–379

  • Palmieri F, Ficco M, Castiglione A (2014a) Adaptive stealth energy-related dos attacks against cloud data centers. In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp 265–272

  • Palmieri F, Fiore U, Castiglione A (2014b) A distributed approach to network anomaly detection based on independent component analysis. Concurr Comput Pract Exp 26(5):1113–1129

    Article  Google Scholar 

  • Palmieri F, Ricciardi S, Fiore U, Ficco M, Castiglione A (2015) Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures. J Supercomput 71(5):1620–1641

    Article  Google Scholar 

  • Paxson V (2001) An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Comput Commun Rev 31(3):38–47

    Article  Google Scholar 

  • Paxson V, Floyd S (1995) Wide area traffic: the failure of poisson modeling. IEEE/ACM Trans Netw 3(3):226–244

    Article  Google Scholar 

  • Rooj G (2011) Real stateful tcp packet filtering in ip filter. In: 10th USENIX Security Symposium

  • Scherrer A, Larrieu N, Owezarski P, Borgnat P, Abry P (2007) Non-gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Trans Dependable Secure Comput 4(1):56–70

    Article  Google Scholar 

  • Tsunoda H, Ohta K, Yamamoto A, Ansari N, Waizumi Y, Nemoto Y (2008) Detecting drdos attacks by a simple response packet confirmation mechanism. Comput Commun 31(14):3299–3306

    Article  Google Scholar 

  • Wei W, Chen F, Xia Y, Jin G (2013) A rank correlation based detection against distributed reflection dos attacks. IEEE Commun Lett 17(1):173–175

    Article  Google Scholar 

  • Wei W, Liu Y, Zhang Y (2014a) TRLMS: two-stage resource scheduling algorithm for cloud based live media streaming system. IEICE Trans Inf Syst 97-D(7):1731–1734

  • Wei W, Zhang Y, Liu Y (2014b) A time-efficient solution to the general resource placement problem in cloud. Math Prob Eng 2014(1):1–10. http://www.hindawi.com/journals/mpe/2014/760458/

  • Xie Y, Yu S (2009a) A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors. IEEE/ACM Trans Netw 17(1):54–56

    Article  Google Scholar 

  • Xie Y, Yu S (2009b) Monitoring the application-layer ddos attacks for popular websites. IEEE/ACM Trans Netw 17(1):15–25

    Article  Google Scholar 

  • Yu S, Zhou W, Doss R (2008) Information theory based detection against network behavior mimicking ddos attacks. IEEE Commun Lett 12(4):319–321

    Google Scholar 

  • Yu S, Zhou W, Jia W, Guo S, Xiang Y, Tang F (2013) Discriminating ddos attacks from flash crowds using flow correlation coffcient. IEEE Trans Parallel Distribut Syst 23(6):1073–1080

    Article  Google Scholar 

Download references

Acknowledgments

This study was funded by National Natural Science Foundation of China (Grant Number 61202099, number U1504607), Plan of Nature Science Fundamental Research in Henan University of Technology (Grant Number 2014JCYJ04).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Le Xiao.

Ethics declarations

Compliance with ethical standards

No sources of funding were used to assist in the preparation of this study.

Conflict of interest

The authors declare that there is no conflict of interests regarding the publication of this paper.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V. Loia.

Appendix

Appendix

Proof of Theorem 1

\(X_{a} \) and \(X_{b} \) follow the Pareto distribution if they are flash crowds. The probability of \(x_{a} [n]=x_{b} [n]=x\) is:

$$\begin{aligned} Pr([x_{a} [n]=x_{b} [n]=x)=\left( {\frac{\alpha \cdot \beta ^{\alpha }}{x^{\alpha +1}}} \right) ^{2}<1 \end{aligned}$$

If \(X_{a} =X_{b} \), i.e., \(x_{a} [n]=x_{b} [n]\) for each \(n(1{ }\le n{ }\le N)\), then we have:

$$\begin{aligned} Pr(X_{a} =X_{b} )=\left( {Pr([x_{a} [n]=x_{b} [n]=x)} \right) ^{N}=\left( {\frac{\alpha \cdot \beta ^{\alpha }}{x^{\alpha +1}}} \right) ^{2N} \end{aligned}$$

It can be concluded that:

$$\begin{aligned} \lim \limits _{N\rightarrow \infty } \rho _{X_{i} ,X_{j} } [k]=\lim \limits _{N\rightarrow \infty } Pr(X_{a} =X_{b} )=0 \end{aligned}$$

\(\square \)

Proof of Theorem 2

With no background noise and network delay, there is \(x_{a} [n]=kx_{b} [n](1\le n\le N)\), where \(k=M_{a} /M_{b} \) in Eqs. 8 and 9. Then we have: \(\begin{array}{l} \rho _{X_{a} ,X_{b} } [k]\quad \\ =\quad \frac{\frac{1}{N}\sum \limits _{n=1}^N {x_{a} [n]x_{b} [n]} }{\frac{1}{N}\left[ {\sum \limits _{n=1}^N {x_{a}^{2} [n]} \sum \limits _{n=1}^N {x_{b}^{2} [n]} } \right] ^{1/2}} \\ =\quad \frac{\sum \limits _{n=1}^N {kx_{b}^{2} [n]} }{\left[ {\sum \limits _{n=1}^N {k^{2}x_{b}^{2} [n]} \sum \limits _{n=1}^N {x_{b}^{2} [n]} } \right] ^{1/2}} \\ =\frac{k\sum \limits _{n=1}^N {x_{b}^{2} [n]} }{\left[ {(k\sum \limits _{n=1}^N {x_{b}^{2} [n]} )^{2}} \right] ^{1/2}}=1 \\ \end{array}\) \(\square \)

Proof of Theorem.3

Let \(X_{a} \) and \(X_{b} \) be two random flash crowds, \(X_{c} \) and \(X_{d} \) be two RDoS flooding attack flows, and \(\Delta \) be a very small real number. Based on Theorem 1, for a givenN, it has:

$$\begin{aligned} Pr(\rho _{X_{a} ,X_{b} } [k]<\Delta \vert N)=1 \end{aligned}$$

Based on Theorem 2, given N and signal-noise-rate (SNR), the following equation holds. Here SNR is the ratio of attacking traffic rate to background traffic rate.

$$\begin{aligned} Pr(\rho _{X_{c} ,X_{d} } [k]\ge \Delta \vert N,SNR)=1 \end{aligned}$$

Since \(\rho _{X_{a} ,X_{b} } [k]\) is decreasing along with increasing of N(the length of flow). In perfect condition, \(\rho _{X_{c} ,X_{d} } [k]=1\) and \(\rho _{X_{a} ,X_{b} } [k]\) decreases with increasing of SNR. As a result, there must exist a point where both above two equations hold, i.e., \(\rho _{X_{a} ,X_{b} } [k]<\Delta \le \rho _{X_{c} ,X_{d} } [k]\), thus reflection DoS attacking flow can be isolated from flash crowds, and Theorem holds as well. \(\square \)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xiao, L., Wei, W., Yang, W. et al. A protocol-free detection against cloud oriented reflection DoS attacks. Soft Comput 21, 3713–3721 (2017). https://doi.org/10.1007/s00500-015-2025-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-015-2025-6

Keywords

Navigation