Skip to main content

2016 | OriginalPaper | Buchkapitel

An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks

verfasst von : Degang Sun, Kun Yang, Weiqing Huang, Yan Wang, Bo Hu

Erschienen in: Information and Communications Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

DDoS attacks are very difficult to detect, researches have been in the pursuit of highly efficient and flexible DDoS attacks detection methods. For this purpose, we put forward an improved Non-parametric CUSUM method (NPCUSUM), which combined with adaptive sliding windows (ASW), to detect DDoS attacks. In order to evaluate our method, we do experiments on 2000 DARPA Intrusion Detection Scenario Specific Data Set (DARPA 2000 Dataset). The results show that the proposed method improves the detection efficiency and has good flexibility.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Kaspersky Report, Statistics on botnet-assisted DDoS attacks in Q1 2015 Kaspersky Report, Statistics on botnet-assisted DDoS attacks in Q1 2015
4.
Zurück zum Zitat Bhuyan, M.H., et al.: Detecting distributed denial of service attacks: methods, tools and future directions. Comput. J. 57(4), 537–556 (2014)CrossRef Bhuyan, M.H., et al.: Detecting distributed denial of service attacks: methods, tools and future directions. Comput. J. 57(4), 537–556 (2014)CrossRef
5.
Zurück zum Zitat Prasad, K.M., Reddy, A.R.M., Rao, K.V.: DoS and DDoS attacks: defense, detection and traceback mechanisms-a survey. Global. J. Comput. Sci. Technol. 14(7) (2014) Prasad, K.M., Reddy, A.R.M., Rao, K.V.: DoS and DDoS attacks: defense, detection and traceback mechanisms-a survey. Global. J. Comput. Sci. Technol. 14(7) (2014)
6.
Zurück zum Zitat Murtaza, S.S., Khreich, W., Hamou-Lhadj, A., et al.: A host-based anomaly detectionapproach by representing system calls as states of kernel modules. In: 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), pp. 431–440. IEEE (2013) Murtaza, S.S., Khreich, W., Hamou-Lhadj, A., et al.: A host-based anomaly detectionapproach by representing system calls as states of kernel modules. In: 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), pp. 431–440. IEEE (2013)
7.
Zurück zum Zitat Forrest, S., Hofmeyr, S., Somayaji, A., et al.: A sense of self for unix processes. In: 1996 IEEE Symposium on Security and Privacy, pp. 120–128. IEEE (1996) Forrest, S., Hofmeyr, S., Somayaji, A., et al.: A sense of self for unix processes. In: 1996 IEEE Symposium on Security and Privacy, pp. 120–128. IEEE (1996)
8.
Zurück zum Zitat Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical approaches to DDoS attack detection and response. In: Proceedings of DARPA Information Survivability Conference and Exposition, vol. 1, pp. 303–314. IEEE, April 2003 Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical approaches to DDoS attack detection and response. In: Proceedings of DARPA Information Survivability Conference and Exposition, vol. 1, pp. 303–314. IEEE, April 2003
9.
Zurück zum Zitat No, G., Ra, I.: Adaptive DDoS detector design using fast entropy computation method. In: 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 86–93. IEEE (2011) No, G., Ra, I.: Adaptive DDoS detector design using fast entropy computation method. In: 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 86–93. IEEE (2011)
10.
Zurück zum Zitat Zhao, X.H., Xia, J.B., Guo, W.W., Du, H.H.: Detection DDoS attacks based on multi-dimensional entropy. J. Air Force Eng. Univ. (Natural Science Edition) 3, 015 (2013) Zhao, X.H., Xia, J.B., Guo, W.W., Du, H.H.: Detection DDoS attacks based on multi-dimensional entropy. J. Air Force Eng. Univ. (Natural Science Edition) 3, 015 (2013)
12.
Zurück zum Zitat Cover, T.M., Thomas, J.A.: Elements of Information Theory, 1st edn. Wiley, New York (1991). ISBN 0-471-06259-6CrossRef Cover, T.M., Thomas, J.A.: Elements of Information Theory, 1st edn. Wiley, New York (1991). ISBN 0-471-06259-6CrossRef
13.
Zurück zum Zitat Bereziski, P., et al.: An entropy-based network anomaly detection method. Entropy 17(4), 2367–2408 (2015)CrossRef Bereziski, P., et al.: An entropy-based network anomaly detection method. Entropy 17(4), 2367–2408 (2015)CrossRef
14.
Zurück zum Zitat Thapngam, T., Yu, S., Zhou, W., Makki, S.K.: Distributed Denial of Service (DDoS) detection by traffic pattern analysis. Peer-to-Peer Networking Appl. 7(4), 346–358 (2014)CrossRef Thapngam, T., Yu, S., Zhou, W., Makki, S.K.: Distributed Denial of Service (DDoS) detection by traffic pattern analysis. Peer-to-Peer Networking Appl. 7(4), 346–358 (2014)CrossRef
15.
Zurück zum Zitat Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recogn. Lett. 51, 1–7 (2015)CrossRef Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recogn. Lett. 51, 1–7 (2015)CrossRef
17.
Zurück zum Zitat Bassevilleand, M., Nikiforov, I.V.: Detection of Abrupt Changes: Theory and Application. Prentice-Hall Inc., Upper Saddle River (1993) Bassevilleand, M., Nikiforov, I.V.: Detection of Abrupt Changes: Theory and Application. Prentice-Hall Inc., Upper Saddle River (1993)
19.
Metadaten
Titel
An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks
verfasst von
Degang Sun
Kun Yang
Weiqing Huang
Yan Wang
Bo Hu
Copyright-Jahr
2016
Verlag
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-319-29814-6_25

Premium Partner