DocumentCode :
1780411
Title :
The Protocol Independent Detection and Classification (PIDC) system for DRDoS attack
Author :
Mohana Priya, P. ; Akilandeswari, V. ; Shalinie, S. Mercy ; Lavanya, V. ; Shanmuga Priya, M.
Author_Institution :
Dept. of Comput. Sci. & Eng., Thiagarajar Coll. of Eng., Madurai, India
fYear :
2014
fDate :
10-12 April 2014
Firstpage :
1
Lastpage :
7
Abstract :
High-rate flooding attack detection and classification has become a necessary component for network administrators due to their attack range that affects the Data Center servers. The main objective of this paper is to propose the Protocol Independent Detection and Classification (PIDC) system in order to prevent the web servers from devastating attacks such as Distributed Reflection Denial of Service (DRDoS) attacks. The DRDoS flooding attack exploits fixed IP spoofing to defeat the Distributed Denial of Service (DDoS) attack prevention measures. This is the first paper to detect and classify the types of reflected attacks using SNMP MIB variables. The proposed PIDC system uses the data mining and machine learning techniques to detect all types of reflected flooding attacks. The rank correlation based detection algorithm retrieves the incoming traffic in the form of Simple Network Management Protocol -Management Information Base (SNMP-MIB) variables and finds the relationship between the MIB variables to detect the attacks from the normal traffic. Then, C4.5 classification algorithm extracts and frames association rule based on protocol information from reflected DDoS flooding attacks. Finally, the CPU, memory and disk resource distribution to legitimate requests are also increased. This method achieves 99% of true positive rates and less false positive rate of (1%) when compared to existing reflected attack detection methods. Moreover, these attacks are classified by types such as TCP reflection attacks and DNS reflection attacks with the highest probability of attack traffic.
Keywords :
Internet; computer centres; computer network management; computer network security; data mining; file servers; pattern classification; protocols; C4.5 classification algorithm; CPU; DDoS attack prevention measures; DNS reflection attacks; DRDoS attack; DRDoS flooding; PIDC system; SNMP MIB variables; SNMP-MIB variables; TCP reflection attacks; Web servers; attack traffic probability; data center servers; data mining; disk resource distribution; distributed denial of service attack prevention measures; distributed reflection denial of service attacks; fixed IP spoofing; flooding attack classification; flooding attack detection; frames association rule; incoming traffic retrieval; machine learning techniques; protocol independent detection and classification system; protocol information; rank correlation based detection algorithm; simple network management protocol-management information base variables; Classification algorithms; Computer crime; Floods; IP networks; Protocols; Reflection; Servers; Amplification attacks; Bandwidth attacks; DRDoS attacks; High rate flooding attacks; Reflection attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Recent Trends in Information Technology (ICRTIT), 2014 International Conference on
Conference_Location :
Chennai
Type :
conf
DOI :
10.1109/ICRTIT.2014.6996154
Filename :
6996154
Link To Document :
بازگشت