DocumentCode
652203
Title
DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics
Author
Yuan Tao ; Shui Yu
Author_Institution
Anhui Earthquake Bur., Hefei, China
fYear
2013
fDate
16-18 July 2013
Firstpage
233
Lastpage
240
Abstract
DDoS attacks are one of the major threats to Internet services. Sophisticated hackers are mimicking the features of legitimate network events, such as flash crowds, to fly under the radar. This poses great challenges to detect DDoS attacks. In this paper, we propose an attack feature independent DDoS flooding attack detection method at local area networks. We employ flow entropy on local area network routers to supervise the network traffic and raise potential DDoS flooding attack alarms when the flow entropy drops significantly in a short period of time. Furthermore, information distance is employed to differentiate DDoS attacks from flash crowds. In general, the attack traffic of one DDoS flooding attack session is generated by many bots from one botnet, and all of these bots are executing the same attack program. As a result, the similarity among attack traffic should higher than that among flash crowds, which are generated by many random users. Mathematical models have been established for the proposed detection strategies. Analysis based on the models indicates that the proposed methods can raise the alarm for potential DDoS flooding attacks and can differentiate DDoS flooding attacks from flash crowds with conditions. The extensive experiments and simulations confirmed the effectiveness of our proposed detection strategies.
Keywords
Internet; computer crime; computer network security; entropy; invasive software; local area networks; random processes; telecommunication traffic; DDoS flooding attack alarm; DDoS flooding attack detection method; Internet service; botnet; bots; flow entropy drop; hacking; information theoretical metrics; local area network; mathematical model; network event legitimation; network traffic; radar; random user; Ash; Computer crime; Computer hacking; Entropy; Feature extraction; Local area networks; Measurement; DDoS; Detection; Information Metric;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location
Melbourne, VIC
Type
conf
DOI
10.1109/TrustCom.2013.32
Filename
6680846
Link To Document