Title :
Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study
Author :
Cabrera, João B D ; Lewis, Lundy ; Qin, Xinzhou ; Lee, Wenke ; Prasanth, Ravi K. ; Ravichandran, B. ; Mehra, Raman K.
Author_Institution :
Scientific Syst. Co., Woburn, MA, USA
Abstract :
We propose a methodology for utilizing network management systems for the early detection of distributed denial of service (DDoS) attacks. Although there are quite a large number of events that are prior to an attack (e.g. suspicious log-ons, start of processes, addition of new files, sudden shifts in traffic, etc.), in this work we depend solely on information from MIB (management information base) traffic variables collected from the systems participating in the attack. Three types of DDoS attacks were effected on a research test bed, and MIB variables were recorded. Using these datasets, we show how there are indeed MIB-based precursors of DDoS attacks that render it possible to detect them before the target is shut down. Most importantly, we describe how the relevant MIB variables at the attacker can be extracted automatically using statistical tests for causality. It is shown that statistical tests applied in the time series of MIB traffic at the target and the attacker are effective in extracting the correct variables for monitoring in the attacker machine. Following the extraction of these key variables at the attacker, it is shown that an anomaly detection scheme, based on a simple model of the normal rate of change of the key MIBs can be used to determine statistical signatures of attacking behavior. These observations suggest the possibility of an entirely automated procedure centered on network management systems for detecting precursors of distributed denial of service attacks, and responding to them
Keywords :
distributed databases; security of data; statistical analysis; telecommunication computing; telecommunication network management; telecommunication security; telecommunication traffic; time series; MIB traffic variables; anomaly detection scheme; attacker machine monitoring; attacking behavior; automated procedure; datasets; distributed denial of service attacks; management information base; network management systems; proactive detection; research test bed; statistical signatures; statistical tests; time series; Computer crime; Computer network management; Data security; Information security; Intrusion detection; Monitoring; Samarium; Technology management; Testing; USA Councils;
Conference_Titel :
Integrated Network Management Proceedings, 2001 IEEE/IFIP International Symposium on
Conference_Location :
Seattle, WA
Print_ISBN :
0-7803-6719-7
DOI :
10.1109/INM.2001.918069