|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
Detecting Distributed Denial-of-Service Attacks by Analyzing TCP SYN Packets Statistically
Yuichi OHSITA Shingo ATA Masayuki MURATA
Publication
IEICE TRANSACTIONS on Communications
Vol.E89-B
No.10
pp.2868-2877 Publication Date: 2006/10/01 Online ISSN: 1745-1345
DOI: 10.1093/ietcom/e89-b.10.2868 Print ISSN: 0916-8516 Type of Manuscript: PAPER Category: Internet Keyword: Distributed Denial of Service (DDoS), SYN Flood, statistical analysis, gamma distribution, traffic monitoring,
Full Text: PDF(899.1KB)>>
Summary:
Distributed denial-of-service attacks on public servers have recently become more serious. More are SYN Flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. To assure that network services will not be interrupted, we need faster and more accurate defense mechanisms against malicious traffic, especially SYN Floods. One of the problems in detecting SYN Flood traffic is that server nodes or firewalls cannot distinguish the SYN packets of normal TCP connections from those of SYN Flood attack. Moreover, since the rate of normal network traffic may vary, we cannot use an explicit threshold of SYN arrival rates to detect SYN Flood traffic. In this paper we introduce a mechanism for detecting SYN Flood traffic more accurately by taking into consideration the time variation of arrival traffic. We first investigate the statistics of the arrival rates of both normal TCP SYN packets and SYN Flood attack packets. We then describe our new detection mechanism based on the statistics of SYN arrival rates. Our analytical results show that the arrival rate of normal TCP SYN packets can be modeled by a normal distribution and that our proposed mechanism can detect SYN Flood traffic quickly and accurately regardless of time variance of the traffic.
|
|
|