DocumentCode :
257310
Title :
Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly
Author :
Kun Wen ; Jiahai Yang ; Fengjuan Cheng ; Chenxi Li ; Ziyu Wang ; Hui Yin
Author_Institution :
Inst. for the Network Sci. & Cyberspace, Tsinghua Univ., Beijing, China
fYear :
2014
fDate :
4-7 Aug. 2014
Firstpage :
1
Lastpage :
6
Abstract :
Reduction of Quality (RoQ) attack is a stealthy denial of service attack. It can decrease or inhibit normal TCP flows in network. Victims are hard to perceive it as the final network throughput is decreasing instead of increasing during the attack. Therefore, the attack is strongly hidden and it is difficult to be detected by existing detection systems. Based on the principle of Time-Frequency analysis, we propose a two-stage detection algorithm which combines anomaly detection with misuse detection. In the first stage, we try to detect the potential anomaly by analyzing network traffic through Wavelet multiresolution analysis method. According to different time-domain characteristics, we locate the abrupt change points. In the second stage, we further analyze the local traffic around the abrupt change point. We extract the potential attack characteristics by autocorrelation analysis. By the two-stage detection, we can ultimately confirm whether the network is affected by the attack. Results of simulations and real network experiments demonstrate that our algorithm can detect RoQ attacks, with high accuracy and high efficiency.
Keywords :
computer network security; time-frequency analysis; RoQ attack; anomaly detection; autocorrelation analysis; denial of service attack; detection algorithm; detection systems; inhibit normal TCP flows; localized periodicity analysis; network traffic; reduction of quality; time-frequency analysis; traffic anomaly; wavelet multiresolution analysis method; Algorithm design and analysis; Computer crime; Correlation; Detection algorithms; Multiresolution analysis; RoQ attack; anomaly detection; misuse detection; network security; wavelet analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Communication and Networks (ICCCN), 2014 23rd International Conference on
Conference_Location :
Shanghai
Type :
conf
DOI :
10.1109/ICCCN.2014.6911829
Filename :
6911829
Link To Document :
بازگشت