Title :
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time
Author :
Dawei Wang ; Longtao He ; Yibo Xue ; Yingfei Dong
Author_Institution :
Nat. Comput. network Emergency Response Tech. Team/Coordination Center of China, Beijing, China
fDate :
Oct. 30 2012-Nov. 1 2012
Abstract :
DoS is still one of the most serious attacks on the Internet. Payload-based approaches are effective to known DOS attacks but are unable to be deployed on high-speed networks. To address this issue, flow-based DOS detection schemes have been proposed for highspeed networks as an effective supplement of payload-based solutions. However, existing flow-based solutions have serious limitations in detecting unknown attacks and efficiently identifying real attack flows buried in the background traffic. In addition, existing solutions also have difficulty to adapt to attack dynamics. To address these issues, this paper proposes a flow-based DOS detection scheme based on Artificial Immune systems. We adopt a tree structure to store flow information such that we can effectively extract useful features from flow information for better detecting DoS attacks. We employ Neighborhood Negative Selection (NNS) as the detection algorithm to detect unknown DoS attacks, and identify attack flows from massive traffic. Because the strong tolerance of NNS, the proposed solution is able to quickly adapt attack dynamics. The experimental results show that this solution is able to effectively detect unknown DoS attack flows and identify attack flows from background traffic. Meanwhile, the theoretical analysis demonstrates that this system can extract flow features more effectively.
Keywords :
Internet; artificial immune systems; computer network security; real-time systems; telecommunication traffic; DoS attack flows; DoS attacks; Internet; NNS; artificial immune systems; attack dynamics; background traffic; detection algorithm; flow information; flow-based DOS detection schemes; flow-based solutions; high-speed networks; neighborhood negative selection; payload-based approaches; payload-based solutions; real attack flows; tree structure; Artificial neural networks; Computer crime; Data mining; Detectors; Feature extraction; IP networks; Protocols; Artificial immune; DoS attack; Flow; Intrusion detection;
Conference_Titel :
Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4673-1855-6
DOI :
10.1109/CCIS.2012.6664254