skip to main content
10.1145/1582379.1582403acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

A prediction-based detection algorithm against distributed denial-of-service attacks

Authors Info & Claims
Published:21 June 2009Publication History

ABSTRACT

Denial-of-Service (DoS) attacks especially distributed DoS (DDoS) attacks have become significant and increasing threats to the Internet. Huge efforts from both academia and industry have been made on detection and defense of DDoS attacks. However, most detection and defense schemes do not directly aim at protecting the victim of attacks itself (e.g., servers) but attack sources or intermediate network units. Although locating and identifying attacking sources are critical to stop attacks and for legal procedure, rapid and efficient predicting DDoS attacks to happen in the server is more important to reduce damage caused by attacks and even prevent attacks from happening. However, this part has not been addressed sufficiently in the literature. In this paper, we first briefly review research efforts on DDoS attacks, and then discuss a method to define and quantify attacks to severs based on available service rates. This is because the server is often the direct victim of DDoS attacks and the one-point failure of the entire service system. No matter whether there are attacks undergoing, if a sever is overloaded even by normal service requests, the effect imposed to a service system is equivalent to that of attacks. A prediction method for the available service rate of the protected server is then proposed, which applies the Auto Regressive Integrated Auto Regressive (ARIMA) model. Finally, we investigate the proposed prediction method to predict DDoS attacks through simulation studies with NS2. The simulation results show that the prediction algorithm is effective to predict most attacks.

References

  1. S. Cheung, "Denial of Service against the Domain Name System," IEEE Security and Privacy, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. H. R. Nageth, K. C. Sekaran and A. R. Kordcal, "Proactive model for Mitigating Internet Denial-of-Service Attacks," IEEE Computer Society, May 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. P. Ferguson and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing," IRFC 2267, January 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Y. N. Jing, P. Tu, X. P. Wang and G. D. Zhang, "Distributed-Log-Based Scheme for IP Traceback," IEEE Computer Society, CIT05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Mahajan, S. M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," In ACM Computer Communication Review, July 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Mirkovic and P. Reiher "A taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM, April 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Mirkovic and P. Reiher, "D-WARD: A Source-End Defence against Flooding Denial-of-Service Attacks," IEEE Computer Society, Jury 2005.Google ScholarGoogle Scholar
  8. H. Wang, D. Zhang and K. G. Shin, "Change-Point Monitoring for the Detection of DoS Attacks," IEEE Trans. Dependable and Secure Computing, vol. 1, no. 4, Oct.-Dec. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Y. Kim, W. C. Lau and M. C. Chauah, "Packet Score: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks," IEEE Computer Society, May 2006.Google ScholarGoogle Scholar
  10. A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent and W. T. Strayer, "Hashbased IP Traceback," In Proceedings of the ACM SIGCOMM, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. Carl, G. Kesidis, R. R. Brooks and S. Rai, "Denial-of-Service Attack-Detection Techniques," In IEEE Internet Computing, June 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Kuzmanovic and E. Knightly, "Low-Rate TCP-Targeted Denial of Service Attacks and Counter Strategies," IEEE/ACM Transactions on Networking, August 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. E. P. Box, G. M. Jenkins and G. C. Reinsel, "Time Series Analysis: Forecasting and Control(edition 3)," POSTS and TELECOM PRESSS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. "The Network Simulator NS-2," "http://www.isi.edu/nsnam/ns/."Google ScholarGoogle Scholar

Index Terms

  1. A prediction-based detection algorithm against distributed denial-of-service attacks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
      June 2009
      1561 pages
      ISBN:9781605585697
      DOI:10.1145/1582379

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 June 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader