DocumentCode :
1666179
Title :
Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics
Author :
Siaterlis, Christos ; Maglaris, Vasilis
Author_Institution :
Dept. of Electr. & Comput. Eng., Nat. Tech. Univ. of Athens, Greece
fYear :
2005
Firstpage :
469
Lastpage :
475
Abstract :
Detection of distributed denial of service attacks should ideally take place near their sources, at edge networks, where countermeasures are most effective. DDoS detection by monitoring an over-provisioned backbone link either near the source or the victim is challenging because congestion isn´t the identifying anomaly signature. Most research efforts try to identify a single detection metric that can reliably detect DDoS attacks. On the contrary, we use multiple metrics to successfully detect flooding attacks at the edge and classify them as incoming or outgoing attacks with an artificial neural network (ANN). We explore the DDoS detection ability of multi-layer perceptrons (MLP) as classifiers we can teach by example. The inputs of the MLP are metrics coming from different types of passive measurements that are available today to network administrators. We use these metrics to feed our MLP, train it and evaluate its performance in terms of ´false positive´ and ´true positive´ rates in the face of new data. Our analysis is based on data from several experiments that were conducted with the use of common DDoS tools in the production network of a university network. We show that the MLP is capable of classifying the state of the monitored edge network as ´DDoS source,´ ´DDoS victim´ or ´normal´. This way an edge network can use a single mechanism to protect itself from incoming DDoS attacks and at the same time protect the rest of the network from outgoing attacks.
Keywords :
Internet; multilayer perceptrons; performance evaluation; security of data; ANN; anomaly signature; artificial neural network; detection of distributed denial of service attacks; multilayer perceptrons; network characteristics; overprovisioned backbone link; performance evaluation; single detection metric; Artificial neural networks; Clustering algorithms; Computer crime; Data analysis; Feeds; Floods; Monitoring; Multilayer perceptrons; Protection; Spine;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computers and Communications, 2005. ISCC 2005. Proceedings. 10th IEEE Symposium on
ISSN :
1530-1346
Print_ISBN :
0-7695-2373-0
Type :
conf
DOI :
10.1109/ISCC.2005.50
Filename :
1493768
Link To Document :
بازگشت