Skip to main content

2020 | OriginalPaper | Buchkapitel

DDoS-Attacks Identification Based on the Methods of Traffic Dynamic Filtration and Bayesian Classification

verfasst von : Andrey Krasnov, Evgeniy Nadezhdin, Dmitri Nikol’skii, Petr Panov

Erschienen in: Modern Information Technology and IT Education

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An approach to the problem of DDoS attacks identifying is considered, it includes: formation of network traffic’s secondary informative features of its temporal structure, based on the observed primary characteristics (header of data packets), detection of attacks, and classification of attack types. The first task is solved by the method of dynamic filtering, the second – by estimating of changes in the statistic of traffic secondary informative features by the minimum set of their observations, and the third – by the Bayesian classification. For traffic dynamic filtering, it is suggested to use: the causal transformation operator, the evolution operator, and median and correlation operators. For attacks detection, Wald’s sequential analysis is applied. Experimental studies were conducted on the test stand with special software complex for simulating DDoS attacks and software complex for their detection and identification. The results that our software complex for DDoS attacks detection and identification achieves are: detection of network attacks of various types based on joint consideration of probabilistic statistics generated separately by the values of parameters of address and load fields of data packet headers; using the obtained statistics to detect attacks with a priori specified values of errors of the 1st and 2nd type; the choice of an adequate method of protection against DDoS-attacks, taking into account its type.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Sindhu Arumugam, D.V., Sumathi, M.V.P.: Detection of botnet using fuzzy C-means clustering by analyzing the network traffic. Int. J. Sci. Eng. Res. 6(4), 475–479 (2015) Sindhu Arumugam, D.V., Sumathi, M.V.P.: Detection of botnet using fuzzy C-means clustering by analyzing the network traffic. Int. J. Sci. Eng. Res. 6(4), 475–479 (2015)
4.
Zurück zum Zitat Sanders, C.: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd edn. No Starch Press Inc, San Francisco (2011) Sanders, C.: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 2nd edn. No Starch Press Inc, San Francisco (2011)
5.
Zurück zum Zitat Bhattacharyya, D.K., Kalita, J.K.: DDoS Attacks. Evolution, Detection, Prevention, Reaction and Tolerance. Taylor and Francis, Boca Raton (2016)CrossRef Bhattacharyya, D.K., Kalita, J.K.: DDoS Attacks. Evolution, Detection, Prevention, Reaction and Tolerance. Taylor and Francis, Boca Raton (2016)CrossRef
7.
Zurück zum Zitat Liu, Y., Zhang, L., Guan, Y.: Sketch-based streaming PCA algorithm for network-wide traffic anomaly detection. In: 2010 IEEE 30th International Conference on Distributed Computing Systems, pp. 807–816. Department of Electrical and Computer Engineering Iowa State University, Ames (2010). https://doi.org/10.1109/icdcs.2010.45 Liu, Y., Zhang, L., Guan, Y.: Sketch-based streaming PCA algorithm for network-wide traffic anomaly detection. In: 2010 IEEE 30th International Conference on Distributed Computing Systems, pp. 807–816. Department of Electrical and Computer Engineering Iowa State University, Ames (2010). https://​doi.​org/​10.​1109/​icdcs.​2010.​45
16.
Zurück zum Zitat Galayev, V.S., Krasnov, A.E., Nikol’skii, D.N., Repin, D.S.: The space of structural features for increasing the effectiveness of algorithms for detecting network attacks, based on the detection of deviations in traffic of extremely large volumes. Int. J. Appl. Eng. Res. 12(21), 10781–10790 (2017) Galayev, V.S., Krasnov, A.E., Nikol’skii, D.N., Repin, D.S.: The space of structural features for increasing the effectiveness of algorithms for detecting network attacks, based on the detection of deviations in traffic of extremely large volumes. Int. J. Appl. Eng. Res. 12(21), 10781–10790 (2017)
17.
Zurück zum Zitat Ke, L., Wanlei, Z., Ping, L., Jianwen, L.: Distinguishing DDoS attacks from flash crowds using probability metrics. In: 2009 IEEE Third International Conference on Network and System Security, pp. 9–17. School of Engineering and Information Technology Deakin University, Shanghai (2009). https://doi.org/10.1109/nss.2009.35 Ke, L., Wanlei, Z., Ping, L., Jianwen, L.: Distinguishing DDoS attacks from flash crowds using probability metrics. In: 2009 IEEE Third International Conference on Network and System Security, pp. 9–17. School of Engineering and Information Technology Deakin University, Shanghai (2009). https://​doi.​org/​10.​1109/​nss.​2009.​35
18.
Zurück zum Zitat Chawla, S., Sachdeva, M., Behal, S.: Discrimination of DDoS attacks and flash events using pearson’s product moment correlation method. Int. J. Comput. Sci. Inf. Secur. 14(10), 382–389 (2016) Chawla, S., Sachdeva, M., Behal, S.: Discrimination of DDoS attacks and flash events using pearson’s product moment correlation method. Int. J. Comput. Sci. Inf. Secur. 14(10), 382–389 (2016)
19.
Zurück zum Zitat Malina, L., Dzurenda, P., Hajny, J.: Testing of DDoS protection solutions. In: Security and Protection of Information 2015, Brno, Czech, pp. 113–128 (2015) Malina, L., Dzurenda, P., Hajny, J.: Testing of DDoS protection solutions. In: Security and Protection of Information 2015, Brno, Czech, pp. 113–128 (2015)
21.
Zurück zum Zitat Gupta, B.B., Joshi, R.C., Misra, M.: ANN based scheme to predict number of zombies in a DDoS attack. Int. J. Netw. Secur. 14(2), 61–70 (2012) Gupta, B.B., Joshi, R.C., Misra, M.: ANN based scheme to predict number of zombies in a DDoS attack. Int. J. Netw. Secur. 14(2), 61–70 (2012)
30.
Zurück zum Zitat Krasnov, A.E., Nadezhdin, E.N., Galayev, V.S., Zykova, E.A., Nikol’skii, D.N., Repin, D.S.: DDoS attack detection based on network traffic phase coordinates analysis. Int. J. Appl. Eng. Res. 13(8), 5647–5654 (2018) Krasnov, A.E., Nadezhdin, E.N., Galayev, V.S., Zykova, E.A., Nikol’skii, D.N., Repin, D.S.: DDoS attack detection based on network traffic phase coordinates analysis. Int. J. Appl. Eng. Res. 13(8), 5647–5654 (2018)
32.
Zurück zum Zitat Krasnov, A.E., Nadezhdin, E.N., Nikol’skii, D.N., Repin, D.S., Galayev, V.S.: Detecting DDoS attacks by analyzing the dynamics and interrelation of network traffic characteristics. Bull. Udmurt Univ. Math. Mech. Comput. Sci. 28(3), 407–418 (2018). [in Russian]. https://doi.org/10.20537/vm180310 Krasnov, A.E., Nadezhdin, E.N., Nikol’skii, D.N., Repin, D.S., Galayev, V.S.: Detecting DDoS attacks by analyzing the dynamics and interrelation of network traffic characteristics. Bull. Udmurt Univ. Math. Mech. Comput. Sci. 28(3), 407–418 (2018). [in Russian]. https://​doi.​org/​10.​20537/​vm180310
33.
Zurück zum Zitat Demidovich, B.P.: Lectures on the Mathematical Theory of Stability. Nauka, Moscow (1967). [in Russian]MATH Demidovich, B.P.: Lectures on the Mathematical Theory of Stability. Nauka, Moscow (1967). [in Russian]MATH
34.
Zurück zum Zitat Sitenko, A.G.: Scattering Theory (Lecture Course), 2nd edn. Viwa shkola, Kiev (1975). [in Russian] Sitenko, A.G.: Scattering Theory (Lecture Course), 2nd edn. Viwa shkola, Kiev (1975). [in Russian]
37.
Zurück zum Zitat Wald, A.: Sequential Analysis. Wiley, New York (1947)MATH Wald, A.: Sequential Analysis. Wiley, New York (1947)MATH
38.
Zurück zum Zitat Krasnov, A.E., Nadezhdin, E.N., Nikol’ski, D.N., Repin, D.S.: Concept of the DDoS-attack detection database complex on the basis of intellectual analysis of network traffic. In: Kolesnikov, A.V. (ed.) Proceedings of the IV All-Russian Pospelovsky Conference with International Participation “Hybrid and Synergetic Intellectual Systems”, pp. 349–354. Immanuel Kant Baltic Federal University, Kaliningrad (2018). [in Russian]. https://elibrary.ru/item.asp?id=34914854& Krasnov, A.E., Nadezhdin, E.N., Nikol’ski, D.N., Repin, D.S.: Concept of the DDoS-attack detection database complex on the basis of intellectual analysis of network traffic. In: Kolesnikov, A.V. (ed.) Proceedings of the IV All-Russian Pospelovsky Conference with International Participation “Hybrid and Synergetic Intellectual Systems”, pp. 349–354. Immanuel Kant Baltic Federal University, Kaliningrad (2018). [in Russian]. https://​elibrary.​ru/​item.​asp?​id=​34914854&​
Metadaten
Titel
DDoS-Attacks Identification Based on the Methods of Traffic Dynamic Filtration and Bayesian Classification
verfasst von
Andrey Krasnov
Evgeniy Nadezhdin
Dmitri Nikol’skii
Petr Panov
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-46895-8_22

Premium Partner