Title :
An efficient sketch-based framework to identify multiple heavy-hitters and its application in DoS detection
Author :
Dashti, Sadegh ; Berenjkoub, Mehdi ; Tahmasbi, Ashraf
Author_Institution :
Dept. of Electr. & Comput. Eng., Isfahan Univ. of Technol., Isfahan, Iran
Abstract :
Nowadays, with the increasing speed of communication links and generated traffic volume, Network Intrusion Detection Systems (NIDSs) encounter new challenges. NIDSs inspect all packets to find attacks and abnormal behaviors. In addition, NIDSs keep the state of each flow to increase accuracy of detection. Performing packet inspection in today´s high-speed networks is hard, or even impossible and keeping per flow state is not scalable. Large-scale attacks such as DoS attack usually produce many flows and keeping their state requires many resources. Consequently, approaches that investigate behavior of communication patterns in flow-level - instead of packet inspection - are taken into consideration. Different algorithms and techniques have been proposed for flow-based detection of DoS attacks. Recently, approaches based on data streaming algorithms have attracted much attention. These algorithms enable the analysis and processing of large data sets by constructing a compact synopsis of input data. This synopsis can be used to answer certain queries over the original data. Sketch is one of these synopsis structures which different intrusion detection systems are proposed by using it. Most of these proposed approaches have good performance if just one flow has anomalous characteristics. But if there are several abnormal flows, sketches encounter difficulties. This paper for the first time provides a framework to avoid such problems in presence of several abnormal flows. The proposed framework rearranges hash functions in an appropriate data structures and overcomes such problems in presence of several abnormal flows.
Keywords :
computer network security; data structures; query processing; DoS attack; DoS detection application; NIDS; anomalous characteristic; communication link; compact data synopsis; data set processing; data streaming algorithm; data structure; flow-based detection; hash function; high-speed network; multiple heavy-hitter identification; network intrusion detection system; packet inspection; per flow state; query answering; sketch-based framework efficiency; Algorithm design and analysis; Approximation algorithms; Approximation methods; Computer crime; High-speed networks; Intrusion detection; Radiation detectors; DoS attack; Sketch; heavy hitter; intrusion detection; related counters;
Conference_Titel :
Electrical Engineering (ICEE), 2014 22nd Iranian Conference on
Conference_Location :
Tehran
DOI :
10.1109/IranianCEE.2014.6999702