Deakin University
Browse

Distributed denial of service (DDoS) detection by traffic pattern analysis

Version 2 2024-06-05, 05:24
Version 1 2014-10-28, 10:01
journal contribution
posted on 2024-06-05, 05:24 authored by T Thapngam, S Yu, W Zhou, S Makki
In this paper, we propose a behavior-based detection that can discriminate Distributed Denial of Service (DDoS) attack traffic from legitimated traffic regardless to various types of the attack packets and methods. Current DDoS attacks are carried out by attack tools, worms and botnets using different packet-transmission rates and packet forms to beat defense systems. These various attack strategies lead to defense systems requiring various detection methods in order to identify the attacks. Moreover, DDoS attacks can craft the traffics like flash crowd events and fly under the radar through the victim. We notice that DDoS attacks have features of repeatable patterns which are different from legitimate flash crowd traffics. In this paper, we propose a comparable detection methods based on the Pearson’s correlation coefficient. Our methods can extract the repeatable features from the packet arrivals in the DDoS traffics but not in flash crowd traffics. The extensive simulations were tested for the optimization of the detection methods. We then performed experiments with several datasets and our results affirm that the proposed methods can differentiate DDoS attacks from legitimate traffics.

History

Journal

Peer-to-peer networking and applications

Volume

7

Pagination

346-358

Location

New York, N.Y.

ISSN

1936-6450

eISSN

1936-6442

Language

eng

Publication classification

C1 Refereed article in a scholarly journal

Copyright notice

2012, Springer

Issue

4

Publisher

Springer New York LLC

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC