Deakin University
Browse

DDoS attack detection at local area networks using information theoretical metrics

conference contribution
posted on 2013-01-01, 00:00 authored by Y Tao, Shui Yu
DDoS attacks are one of the major threats to Internet services. Sophisticated hackers are mimicking the features of legitimate network events, such as flash crowds, to fly under the radar. This poses great challenges to detect DDoS attacks. In this paper, we propose an attack feature independent DDoS flooding attack detection method at local area networks. We employ flow entropy on local area network routers to supervise the network traffic and raise potential DDoS flooding attack alarms when the flow entropy drops significantly in a short period of time. Furthermore, information distance is employed to differentiate DDoS attacks from flash crowds. In general, the attack traffic of one DDoS flooding attack session is generated by many bots from one botnet, and all of these bots are executing the same attack program. As a result, the similarity among attack traffic should higher than that among flash crowds, which are generated by many random users. Mathematical models have been established for the proposed detection strategies. Analysis based on the models indicates that the proposed methods can raise the alarm for potential DDoS flooding attacks and can differentiate DDoS flooding attacks from flash crowds with conditions. The extensive experiments and simulations confirmed the effectiveness of our proposed detection strategies.

History

Event

Trust, Security and Privacy in Computing and Communications. IEEE Conference (12th : 2013 : Melbourne, Victoria)

Pagination

233 - 240

Publisher

IEEE Computer Society

Location

Melbourne, Victoria

Place of publication

Piscataway, N.J.

Start date

2013-07-16

End date

2013-07-18

ISBN-13

9780769550220

Language

eng

Publication classification

E1 Full written paper - refereed; E Conference publication

Copyright notice

2013, IEEE

Title of proceedings

TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC