DocumentCode
1129845
Title
Information theory based detection against network behavior mimicking DDoS attacks
Author
Yu, Shui ; Zhou, Wanlei ; Doss, Robin
Author_Institution
Deakin Univ., Melbourne
Volume
12
Issue
4
fYear
2008
fDate
4/1/2008 12:00:00 AM
Firstpage
318
Lastpage
321
Abstract
DDoS is a spy-on-spy game between attackers and detectors. Attackers are mimicking network traffic patterns to disable the detection algorithms which are based on these features. It is an open problem of discriminating the mimicking DDoS attacks from massive legitimate network accessing. We observed that the zombies use controlled function(s) to pump attack packages to the victim, therefore, the attack flows to the victim are always share some properties, e.g. packages distribution behaviors, which are not possessed by legitimate flows in a short time period. Based on this observation, once there appear suspicious flows to a server, we start to calculate the distance of the package distribution behavior among the suspicious flows. If the distance is less than a given threshold, then it is a DDoS attack, otherwise, it is a legitimate accessing. Our analysis and the preliminary experiments indicate that the proposed method- can discriminate mimicking flooding attacks from legitimate accessing efficiently and effectively.
Keywords
entropy; security of data; telecommunication security; telecommunication traffic; information theory-based detection; legitimate accessing; mimicking DDoS attacks; mimicking flooding attacks; network behavior; network traffic patterns; package distribution behavior; spy-on-spy game; Communication system traffic control; Computer crime; Detection algorithms; Detectors; Entropy; Floods; Information theory; Packaging; Surges; Telecommunication traffic;
fLanguage
English
Journal_Title
Communications Letters, IEEE
Publisher
ieee
ISSN
1089-7798
Type
jour
DOI
10.1109/LCOMM.2008.072049
Filename
4489680
Link To Document