skip to main content
10.1145/1582379.1582403acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

A prediction-based detection algorithm against distributed denial-of-service attacks

Published: 21 June 2009 Publication History

Abstract

Denial-of-Service (DoS) attacks especially distributed DoS (DDoS) attacks have become significant and increasing threats to the Internet. Huge efforts from both academia and industry have been made on detection and defense of DDoS attacks. However, most detection and defense schemes do not directly aim at protecting the victim of attacks itself (e.g., servers) but attack sources or intermediate network units. Although locating and identifying attacking sources are critical to stop attacks and for legal procedure, rapid and efficient predicting DDoS attacks to happen in the server is more important to reduce damage caused by attacks and even prevent attacks from happening. However, this part has not been addressed sufficiently in the literature. In this paper, we first briefly review research efforts on DDoS attacks, and then discuss a method to define and quantify attacks to severs based on available service rates. This is because the server is often the direct victim of DDoS attacks and the one-point failure of the entire service system. No matter whether there are attacks undergoing, if a sever is overloaded even by normal service requests, the effect imposed to a service system is equivalent to that of attacks. A prediction method for the available service rate of the protected server is then proposed, which applies the Auto Regressive Integrated Auto Regressive (ARIMA) model. Finally, we investigate the proposed prediction method to predict DDoS attacks through simulation studies with NS2. The simulation results show that the prediction algorithm is effective to predict most attacks.

References

[1]
S. Cheung, "Denial of Service against the Domain Name System," IEEE Security and Privacy, 2006.
[2]
H. R. Nageth, K. C. Sekaran and A. R. Kordcal, "Proactive model for Mitigating Internet Denial-of-Service Attacks," IEEE Computer Society, May 2007.
[3]
P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing," IRFC 2267, January 1998.
[4]
Y. N. Jing, P. Tu, X. P. Wang and G. D. Zhang, "Distributed-Log-Based Scheme for IP Traceback," IEEE Computer Society, CIT05, 2005.
[5]
R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," In ACM Computer Communication Review, July 2001.
[6]
J. Mirkovic and P. Reiher "A taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM, April 2004.
[7]
J. Mirkovic and P. Reiher, "D-WARD: A Source-End Defence against Flooding Denial-of-Service Attacks," IEEE Computer Society, Jury 2005.
[8]
H. Wang, D. Zhang and K. G. Shin, "Change-Point Monitoring for the Detection of DoS Attacks," IEEE Trans. Dependable and Secure Computing, vol. 1, no. 4, Oct.-Dec. 2004.
[9]
Y. Kim, W. C. Lau and M. C. Chauah, "Packet Score: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks," IEEE Computer Society, May 2006.
[10]
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent and W. T. Strayer, "Hashbased IP Traceback," In Proceedings of the ACM SIGCOMM, August 2001.
[11]
G. Carl, G. Kesidis, R. R. Brooks and S. Rai, "Denial-of-Service Attack-Detection Techniques," In IEEE Internet Computing, June 2006.
[12]
A. Kuzmanovic and E. Knightly, "Low-Rate TCP-Targeted Denial of Service Attacks and Counter Strategies," IEEE/ACM Transactions on Networking, August 2006.
[13]
G. E. P. Box, G. M. Jenkins and G. C. Reinsel, "Time Series Analysis: Forecasting and Control(edition 3)," POSTS and TELECOM PRESSS, 2005.
[14]
"The Network Simulator NS-2," "http://www.isi.edu/nsnam/ns/."

Cited By

View all
  • (2024)On Explainable and Adaptable Detection of Distributed Denial-of-Service TrafficIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.330129321:4(2211-2226)Online publication date: Jul-2024
  • (2024)Anticipating Cyber Threats: Deep Learning Approaches for DDoS Attacks Forecasting2024 8th Cyber Security in Networking Conference (CSNet)10.1109/CSNet64211.2024.10851731(128-132)Online publication date: 4-Dec-2024
  • (2023)DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and ChallengesJournal of Sensor and Actuator Networks10.3390/jsan1204005112:4(51)Online publication date: 6-Jul-2023
  • Show More Cited By

Index Terms

  1. A prediction-based detection algorithm against distributed denial-of-service attacks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
    June 2009
    1561 pages
    ISBN:9781605585697
    DOI:10.1145/1582379
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 June 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. available service rate
    2. denial-of-service attacks (DoS)
    3. distributed DoS (DDoS)
    4. prediction-based detection of DDoS and low-rate TCP attacks

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    IWCMC '09
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)On Explainable and Adaptable Detection of Distributed Denial-of-Service TrafficIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.330129321:4(2211-2226)Online publication date: Jul-2024
    • (2024)Anticipating Cyber Threats: Deep Learning Approaches for DDoS Attacks Forecasting2024 8th Cyber Security in Networking Conference (CSNet)10.1109/CSNet64211.2024.10851731(128-132)Online publication date: 4-Dec-2024
    • (2023)DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and ChallengesJournal of Sensor and Actuator Networks10.3390/jsan1204005112:4(51)Online publication date: 6-Jul-2023
    • (2023)DDoS attack forecasting based on online multiple change points detection and time series analysisMultimedia Tools and Applications10.1007/s11042-023-17637-383:18(53655-53685)Online publication date: 23-Nov-2023
    • (2021)Source-side DoS attack detection with LSTM and seasonality embeddingProceedings of the 36th Annual ACM Symposium on Applied Computing10.1145/3412841.3441987(1130-1137)Online publication date: 22-Mar-2021
    • (2021)Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection MechanismsIEEE Access10.1109/ACCESS.2021.31105869(123012-123028)Online publication date: 2021
    • (2021)Detection of Distributed Denial of Service Attacks Using Automatic Feature Selection with Enhancement for Imbalance DatasetIntelligent Information and Database Systems10.1007/978-3-030-73280-6_31(386-398)Online publication date: 5-Apr-2021
    • (2021)Distributed frameworks for detecting distributed denial of service attacks: A comprehensive review, challenges and future directionsConcurrency and Computation: Practice and Experience10.1002/cpe.619733:10Online publication date: 23-Jan-2021
    • (2020)Toward Explainable and Adaptable Detection and Classification of Distributed Denial-of-Service AttacksDeployable Machine Learning for Security Defense10.1007/978-3-030-59621-7_6(105-121)Online publication date: 18-Oct-2020
    • (2019)DDoS Attack Mitigation through Root-DNS Server: A Case Study2019 IEEE World Congress on Services (SERVICES)10.1109/SERVICES.2019.00025(60-65)Online publication date: Jul-2019
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media