Abstract
Distributed denial of service (DDoS) attack presents a critical threat to cloud infrastructure, where many manipulated hosts flood the victim cloud with plenty of packets, which will lead to the exhaustion of bandwidth and other system resources. As one type of DDoS attack, in reflection DoS (RDoS) attack, legitimate servers (reflectors) are fooled into sending a large number of packets to the victim cloud. Most of the existed RDoS attack detection mechanisms are protocol-specific, thus low in efficiency. It is inspected that because of being triggered by the same attacking flow, intra-unite correlation exists among the packet rate of attacking flows. Based on the phenomenon, a flow correlation coefficient (FCC)-based protocol-free detection (PFD) algorithm is proposed. The simulation results show that PFD can detect attacking flows efficiently and effectively and is not protocol-specific, thus can be used as effective supplement to existed algorithms.





Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
CHKP (2010) Stateful inspection technology (the industry standard for enterprise class network security solutions). http://www.checkpoint.com/products/downloads/Stateful _Inspection
Crovella M, Bestavros A (1997) Self-similarity in world wide web traffic: Evidence and possible causes. IEEE/ACM Trans Netw. 5(6):835–846
Drakos RN (2002) Application-level reflection attacks. http://www.lemuria.org/security/application-drdos.html
Ferguson P (2000) rfc2827:network ingress filtering: defeating denial of service attacks which employ ip source address spoofing
Ficco M, Palmieri F (2015) Introducing fraudulent energy consumption in cloud infrastructures: a new generation of denial-of-service attacks. IEEE Syst J 99:1–11
Jung J, Krishnamurthy B, Rabinovich M (2002) Flash crowds and denial of service attacks: characterization and implications for cdns and web sites. In: Proc. 11th Intl Conf. World Wide Web (WWW), pp 252–262
Kandula S, Katabi D, Jacob M, Berger A (2005) Botz-4-sale: surviving organized ddos attacks that mimic flash crowds. In: Proceedings of the 2nd conference on Symposium on Networked Systems Design, vol 2, pp 287–300
Liu Y, Wei W (2015) A replication-based mechanism for fault tolerance in mapreduce framework. Math Probl Eng 2015(1):1–7. http://www.hindawi.com/journals/mpe/2015/408921/
Oikonomou G, Mirkovic J (2009) Modeling human behavior for defense against flash-crowd attacks. In: Proc. IEEE Intl Conf. Comm
Palmieri F, Ricciardi S, Fiore U (2011) Evaluating network-based dos attacks under the energy consumption perspective: new security issues in the coming green ICT area. International Conference on Broadband. Wireless Computing, Communication and Applications (BWCCA), pp 374–379
Palmieri F, Ficco M, Castiglione A (2014a) Adaptive stealth energy-related dos attacks against cloud data centers. In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp 265–272
Palmieri F, Fiore U, Castiglione A (2014b) A distributed approach to network anomaly detection based on independent component analysis. Concurr Comput Pract Exp 26(5):1113–1129
Palmieri F, Ricciardi S, Fiore U, Ficco M, Castiglione A (2015) Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures. J Supercomput 71(5):1620–1641
Paxson V (2001) An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Comput Commun Rev 31(3):38–47
Paxson V, Floyd S (1995) Wide area traffic: the failure of poisson modeling. IEEE/ACM Trans Netw 3(3):226–244
Rooj G (2011) Real stateful tcp packet filtering in ip filter. In: 10th USENIX Security Symposium
Scherrer A, Larrieu N, Owezarski P, Borgnat P, Abry P (2007) Non-gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Trans Dependable Secure Comput 4(1):56–70
Tsunoda H, Ohta K, Yamamoto A, Ansari N, Waizumi Y, Nemoto Y (2008) Detecting drdos attacks by a simple response packet confirmation mechanism. Comput Commun 31(14):3299–3306
Wei W, Chen F, Xia Y, Jin G (2013) A rank correlation based detection against distributed reflection dos attacks. IEEE Commun Lett 17(1):173–175
Wei W, Liu Y, Zhang Y (2014a) TRLMS: two-stage resource scheduling algorithm for cloud based live media streaming system. IEICE Trans Inf Syst 97-D(7):1731–1734
Wei W, Zhang Y, Liu Y (2014b) A time-efficient solution to the general resource placement problem in cloud. Math Prob Eng 2014(1):1–10. http://www.hindawi.com/journals/mpe/2014/760458/
Xie Y, Yu S (2009a) A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors. IEEE/ACM Trans Netw 17(1):54–56
Xie Y, Yu S (2009b) Monitoring the application-layer ddos attacks for popular websites. IEEE/ACM Trans Netw 17(1):15–25
Yu S, Zhou W, Doss R (2008) Information theory based detection against network behavior mimicking ddos attacks. IEEE Commun Lett 12(4):319–321
Yu S, Zhou W, Jia W, Guo S, Xiang Y, Tang F (2013) Discriminating ddos attacks from flash crowds using flow correlation coffcient. IEEE Trans Parallel Distribut Syst 23(6):1073–1080
Acknowledgments
This study was funded by National Natural Science Foundation of China (Grant Number 61202099, number U1504607), Plan of Nature Science Fundamental Research in Henan University of Technology (Grant Number 2014JCYJ04).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Compliance with ethical standards
No sources of funding were used to assist in the preparation of this study.
Conflict of interest
The authors declare that there is no conflict of interests regarding the publication of this paper.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by V. Loia.
Appendix
Appendix
Proof of Theorem 1
\(X_{a} \) and \(X_{b} \) follow the Pareto distribution if they are flash crowds. The probability of \(x_{a} [n]=x_{b} [n]=x\) is:
If \(X_{a} =X_{b} \), i.e., \(x_{a} [n]=x_{b} [n]\) for each \(n(1{ }\le n{ }\le N)\), then we have:
It can be concluded that:
\(\square \)
Proof of Theorem 2
With no background noise and network delay, there is \(x_{a} [n]=kx_{b} [n](1\le n\le N)\), where \(k=M_{a} /M_{b} \) in Eqs. 8 and 9. Then we have: \(\begin{array}{l} \rho _{X_{a} ,X_{b} } [k]\quad \\ =\quad \frac{\frac{1}{N}\sum \limits _{n=1}^N {x_{a} [n]x_{b} [n]} }{\frac{1}{N}\left[ {\sum \limits _{n=1}^N {x_{a}^{2} [n]} \sum \limits _{n=1}^N {x_{b}^{2} [n]} } \right] ^{1/2}} \\ =\quad \frac{\sum \limits _{n=1}^N {kx_{b}^{2} [n]} }{\left[ {\sum \limits _{n=1}^N {k^{2}x_{b}^{2} [n]} \sum \limits _{n=1}^N {x_{b}^{2} [n]} } \right] ^{1/2}} \\ =\frac{k\sum \limits _{n=1}^N {x_{b}^{2} [n]} }{\left[ {(k\sum \limits _{n=1}^N {x_{b}^{2} [n]} )^{2}} \right] ^{1/2}}=1 \\ \end{array}\) \(\square \)
Proof of Theorem.3
Let \(X_{a} \) and \(X_{b} \) be two random flash crowds, \(X_{c} \) and \(X_{d} \) be two RDoS flooding attack flows, and \(\Delta \) be a very small real number. Based on Theorem 1, for a givenN, it has:
Based on Theorem 2, given N and signal-noise-rate (SNR), the following equation holds. Here SNR is the ratio of attacking traffic rate to background traffic rate.
Since \(\rho _{X_{a} ,X_{b} } [k]\) is decreasing along with increasing of N(the length of flow). In perfect condition, \(\rho _{X_{c} ,X_{d} } [k]=1\) and \(\rho _{X_{a} ,X_{b} } [k]\) decreases with increasing of SNR. As a result, there must exist a point where both above two equations hold, i.e., \(\rho _{X_{a} ,X_{b} } [k]<\Delta \le \rho _{X_{c} ,X_{d} } [k]\), thus reflection DoS attacking flow can be isolated from flash crowds, and Theorem holds as well. \(\square \)
Rights and permissions
About this article
Cite this article
Xiao, L., Wei, W., Yang, W. et al. A protocol-free detection against cloud oriented reflection DoS attacks. Soft Comput 21, 3713–3721 (2017). https://doi.org/10.1007/s00500-015-2025-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-015-2025-6