Skip to main content
Top
Published in: Microsystem Technologies 3/2017

18-05-2016 | Technical Paper

DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks

Authors: Debojit Boro, Dhruba K. Bhattacharyya

Published in: Microsystem Technologies | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

High-rate distributed denial of service (HDDoS) flooding attacks pose as a major threat to the Internet. Most present solutions based on machine learning approach are inept for detecting the attacks in real time due to high processing overhead. In this paper, we present a defense solution referred to as DyProSD that combines both the merits of feature-based and statistical approach to handle HDDoS flooding attacks. The statistical module marks the suspicious traffic and forwards to an ensemble of classifiers for ascertaining the traffic as malicious or normal. Our method filters the attack traffic protocol specifically by allocating various protocol specific filter engines dynamically. As and when DDoS attack occurs and the load of a filter engine reaches beyond its capable limit, a new filter engine is recruited dynamically from the idle resource pool for filtering, thus guaranteeing the quality of service for legitimate users concurrently. We establish the effectiveness of DyProSD through several experimental analysis and real-world dataset experiments and the results indicate enough confidence in favour of our solution.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Ahmed E, Mohay G, Tickle A, Bhatia S (2010) Use of ip addresses for high rate flooding attack detection. Security and privacy—silver linings in the cloud. Springer, Berlin, pp 124–135CrossRef Ahmed E, Mohay G, Tickle A, Bhatia S (2010) Use of ip addresses for high rate flooding attack detection. Security and privacy—silver linings in the cloud. Springer, Berlin, pp 124–135CrossRef
go back to reference Basseville M (1989) Distance measures for signal processing and pattern recognition. Signal Process 18(4):349–369MathSciNetCrossRef Basseville M (1989) Distance measures for signal processing and pattern recognition. Signal Process 18(4):349–369MathSciNetCrossRef
go back to reference Bhattacharyya D, Kalita J (2013) Network anomaly detection: a machine learning perspective. CRC Press, Boca Raton Bhattacharyya D, Kalita J (2013) Network anomaly detection: a machine learning perspective. CRC Press, Boca Raton
go back to reference Boro D, Bhattacharyya DK (2015) Particle swarm optimisation-based KNN for improving KNN and ensemble classification performance. Int J Innov Comput Appl IJICA 6(3/4):145–162CrossRef Boro D, Bhattacharyya DK (2015) Particle swarm optimisation-based KNN for improving KNN and ensemble classification performance. Int J Innov Comput Appl IJICA 6(3/4):145–162CrossRef
go back to reference Chen SW, Wu JX, Ye XL, Guo T (2013) Distributed denial of service attacks detection method based on conditional random fields. J Netw 8(4):858–865 Chen SW, Wu JX, Ye XL, Guo T (2013) Distributed denial of service attacks detection method based on conditional random fields. J Netw 8(4):858–865
go back to reference Chen Y, Das S, Dhar P, Saddik AE, Nayak A (2008) Detecting and preventing IP-spoofed distributed DoS attacks. Int J Netw Secur 7(1):70–81 Chen Y, Das S, Dhar P, Saddik AE, Nayak A (2008) Detecting and preventing IP-spoofed distributed DoS attacks. Int J Netw Secur 7(1):70–81
go back to reference Dietrich S, Goddard N, Long N (2000) Analyzing distributed denial of service tools: the Shaft case. Proc. USENIX LISA 2000:329–339 Dietrich S, Goddard N, Long N (2000) Analyzing distributed denial of service tools: the Shaft case. Proc. USENIX LISA 2000:329–339
go back to reference Jung J, Krishnamurthy B, Rabinovich M (2002) Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. In: Proc 11th Int Conf World Wide Web, ACM, pp 293–304 Jung J, Krishnamurthy B, Rabinovich M (2002) Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. In: Proc 11th Int Conf World Wide Web, ACM, pp 293–304
go back to reference Liu H, Sun Y, Valgenti VC, Kim MS (2011) TrustGuard: a flow-level reputation-based DDoS defense system. In: IEEE consumer communications and networking conf. (CCNC), IEEE, pp 287–291 Liu H, Sun Y, Valgenti VC, Kim MS (2011) TrustGuard: a flow-level reputation-based DDoS defense system. In: IEEE consumer communications and networking conf. (CCNC), IEEE, pp 287–291
go back to reference Liu J, Yang X, Ghaboosi K, Deng H, Zhang J (2009) Botnet: classification, attacks, detection, tracing, and preventive measures. EURASIP J Wirel Commun Netw 2009(9):1–11 Liu J, Yang X, Ghaboosi K, Deng H, Zhang J (2009) Botnet: classification, attacks, detection, tracing, and preventive measures. EURASIP J Wirel Commun Netw 2009(9):1–11
go back to reference Opitz D, Maclin R (1999) Popular ensemble methods: an empirical study. J Art Intell Res 11:169–198MATH Opitz D, Maclin R (1999) Popular ensemble methods: an empirical study. J Art Intell Res 11:169–198MATH
go back to reference Paxson V (2001) An analysis of using reflectors for distributed denial-of-service attacks. SIGCOMM Comput Commun Rev 31(3):38–47CrossRef Paxson V (2001) An analysis of using reflectors for distributed denial-of-service attacks. SIGCOMM Comput Commun Rev 31(3):38–47CrossRef
go back to reference Polikar R (2006) Ensemble based systems in decision making. IEEE Circuits Syst Mag 6(3):21–45CrossRef Polikar R (2006) Ensemble based systems in decision making. IEEE Circuits Syst Mag 6(3):21–45CrossRef
go back to reference Preetha G, Devi BSK, Shalinie SM (2014) Autonomous agent for DDoS attack detection and defense in an experimental testbed. Int J Fuzzy Syst 16(4):520–528 Preetha G, Devi BSK, Shalinie SM (2014) Autonomous agent for DDoS attack detection and defense in an experimental testbed. Int J Fuzzy Syst 16(4):520–528
go back to reference Puri R (2003) Bots and botnet: an overview. In: SANS Institute Information Security Reading Room Puri R (2003) Bots and botnet: an overview. In: SANS Institute Information Security Reading Room
go back to reference Rahmani H, Sahli N, Kamoun F (2012) DDoS flooding attack detection scheme based on F-divergence. Comput Commun 35(11):1380–1391CrossRef Rahmani H, Sahli N, Kamoun F (2012) DDoS flooding attack detection scheme based on F-divergence. Comput Commun 35(11):1380–1391CrossRef
go back to reference Rawal B, Ramcharan H, Tsetse A (2013) Emergence of DDoS resistant augmented Split architecture. In: 10th Int. Conf. high capacity optical networks and enabling technologies (HONET-CNS), IEEE, pp 37–43 Rawal B, Ramcharan H, Tsetse A (2013) Emergence of DDoS resistant augmented Split architecture. In: 10th Int. Conf. high capacity optical networks and enabling technologies (HONET-CNS), IEEE, pp 37–43
go back to reference Renyi A (1961) On measures of entropy and information. In: Proceedings of the 4th Berkeley symposium on mathematical statistics and probability, University of California Press, pp 547–561 Renyi A (1961) On measures of entropy and information. In: Proceedings of the 4th Berkeley symposium on mathematical statistics and probability, University of California Press, pp 547–561
go back to reference Salem O, Makke A, Tajer J, Mehaoua A (2011) Flooding attacks detection in traffic of backbone networks. In: IEEE 36th conf. on local computer networks, IEEE, pp 441–449 Salem O, Makke A, Tajer J, Mehaoua A (2011) Flooding attacks detection in traffic of backbone networks. In: IEEE 36th conf. on local computer networks, IEEE, pp 441–449
go back to reference Tang J, Cheng Y, Hao Y, Song W (2014) SIP flooding attack detection with a multi-dimensional sketch design. IEEE Trans Depend Secure Comput 11(6):582–595CrossRef Tang J, Cheng Y, Hao Y, Song W (2014) SIP flooding attack detection with a multi-dimensional sketch design. IEEE Trans Depend Secure Comput 11(6):582–595CrossRef
Metadata
Title
DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks
Authors
Debojit Boro
Dhruba K. Bhattacharyya
Publication date
18-05-2016
Publisher
Springer Berlin Heidelberg
Published in
Microsystem Technologies / Issue 3/2017
Print ISSN: 0946-7076
Electronic ISSN: 1432-1858
DOI
https://doi.org/10.1007/s00542-016-2978-0

Other articles of this Issue 3/2017

Microsystem Technologies 3/2017 Go to the issue