• DocumentCode
    2235565
  • Title

    Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time

  • Author

    Dawei Wang ; Longtao He ; Yibo Xue ; Yingfei Dong

  • Author_Institution
    Nat. Comput. network Emergency Response Tech. Team/Coordination Center of China, Beijing, China
  • fYear
    2012
  • fDate
    Oct. 30 2012-Nov. 1 2012
  • Firstpage
    646
  • Lastpage
    650
  • Abstract
    DoS is still one of the most serious attacks on the Internet. Payload-based approaches are effective to known DOS attacks but are unable to be deployed on high-speed networks. To address this issue, flow-based DOS detection schemes have been proposed for highspeed networks as an effective supplement of payload-based solutions. However, existing flow-based solutions have serious limitations in detecting unknown attacks and efficiently identifying real attack flows buried in the background traffic. In addition, existing solutions also have difficulty to adapt to attack dynamics. To address these issues, this paper proposes a flow-based DOS detection scheme based on Artificial Immune systems. We adopt a tree structure to store flow information such that we can effectively extract useful features from flow information for better detecting DoS attacks. We employ Neighborhood Negative Selection (NNS) as the detection algorithm to detect unknown DoS attacks, and identify attack flows from massive traffic. Because the strong tolerance of NNS, the proposed solution is able to quickly adapt attack dynamics. The experimental results show that this solution is able to effectively detect unknown DoS attack flows and identify attack flows from background traffic. Meanwhile, the theoretical analysis demonstrates that this system can extract flow features more effectively.
  • Keywords
    Internet; artificial immune systems; computer network security; real-time systems; telecommunication traffic; DoS attack flows; DoS attacks; Internet; NNS; artificial immune systems; attack dynamics; background traffic; detection algorithm; flow information; flow-based DOS detection schemes; flow-based solutions; high-speed networks; neighborhood negative selection; payload-based approaches; payload-based solutions; real attack flows; tree structure; Artificial neural networks; Computer crime; Data mining; Detectors; Feature extraction; IP networks; Protocols; Artificial immune; DoS attack; Flow; Intrusion detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on
  • Conference_Location
    Hangzhou
  • Print_ISBN
    978-1-4673-1855-6
  • Type

    conf

  • DOI
    10.1109/CCIS.2012.6664254
  • Filename
    6664254