skip to main content
10.1145/3230833.3230844acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
short-paper

A Reactive Defense Against Bandwidth Attacks Using Learning Automata

Published:27 August 2018Publication History

ABSTRACT

This paper proposes a new adaptively distributed packet filtering mechanism to mitigate the DDoS attacks targeted at the victim's bandwidth. The mechanism employs IP traceback as a means of distinguishing attacks from legitimate traffic, and continuous action reinforcement learning automata, with an improved learning function, to compute effective filtering probabilities at filtering routers. The solution is evaluated through a number of experiments based on actual Internet data. The results show that the proposed solution achieves a high throughput of surviving legitimate traffic as a result of its high convergence speed, and can save the victim's bandwidth even in case of varying and intense attacks.

References

  1. Zubair B. Adi, E. and Philip H. 2017. Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services. Journal of Network and Computer Applications 91 (2017), 1--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Askey and R. Roy. 2010. Beta function. Cambridge University Press.Google ScholarGoogle Scholar
  3. CAIDA. 2004. CAIDA skitter map. (2004). http://www.caida.org/tools/measurement/skitter.Google ScholarGoogle Scholar
  4. M. S. Fallah and N. Kahani. 2014. TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks. Security and Communication Networks 7, 2 (2014), 245--264. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. V. A. Foroushani and A. N. Zincir-Heywood. 2014. TDFA: traceback-based defense against DDoS flooding attacks. In IEEE 28th International Conference on Advanced Information Networking and Applications (AINA). 597--604. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. Frost. 1998. Stochastic optimization of vehicle suspension control systems via learning automata. Ph.D. Dissertation. Loughborough University.Google ScholarGoogle Scholar
  7. Chen Z. Li J. Hongbin, L. and Vasilakos A.V. 2017. Preventing distributed denial-of-service flooding attacks with dynamic path identifiers. IEEE Transactions on Information Forensics and Security 12, 8 (2017), 1801--1815. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Howell, G. Frost, T. Gordon, and Q. Wu. 1997. Continuous action reinforcement learning applied to vehicle suspension control. Journal of Mechatronics 7, 3 (1997), 263--276.Google ScholarGoogle ScholarCross RefCross Ref
  9. N. Kahani, S. Shiry, and M. Bagherzadeh. 2008. Detecting denial of service attacks utilizing machine learning methods. In International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). IEEE.Google ScholarGoogle Scholar
  10. Khan S. Shams B. Khan, M. A. and J. Lloret. 2015. Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks. Security and Communication Networks 9, 15 (2015), 2715--2729. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxon, and S. Shenker. 2002. Controlling high bandwidth aggregates in the network. ACM SIGCOMM Computer Communication Review 32, 3 (2002), 62--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. K.S. Narendra and M.A. Thathachar. 2012. Learning automata: an introduction. Courier Corporation (2012), 1--479.Google ScholarGoogle Scholar
  13. S. Ping and L. Moonchuen. 2004. IP traceback marking scheme based packets filtering mechanism. In Workshop on IP Operations and Management. IEEE, 253--260.Google ScholarGoogle Scholar
  14. M. Sung and J. Xu. 2003. IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks. IEEE Transactions on Parallel and Distributed Systems 14, 9 (2003), 861--872. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Yaar, A. Perrig, and D. Song. 2005. FIT: fast Internet traceback. In IEEE INFOCOM. 1395--1406.Google ScholarGoogle Scholar

Index Terms

  1. A Reactive Defense Against Bandwidth Attacks Using Learning Automata

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and Security
            August 2018
            603 pages
            ISBN:9781450364485
            DOI:10.1145/3230833

            Copyright © 2018 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 27 August 2018

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper
            • Research
            • Refereed limited

            Acceptance Rates

            ARES '18 Paper Acceptance Rate128of260submissions,49%Overall Acceptance Rate228of451submissions,51%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader