DDoS Attack Detection Using IP Address Feature Interaction

Size: px
Start display at page:

Download "DDoS Attack Detection Using IP Address Feature Interaction"

Transcription

1 29 International Conference on Intelligent Networking and Collaborative Systems DDoS Attack Detection Using IP Address Feature Interaction Jieren Cheng, 2, Jianping Yin, Yun Liu, Zhiping Cai, and Chengkun Wu School of Computer, National University of Defense Technology, 473 Changsha, China 2 Department of Mathematics Xiangnan University, 423 Chenzhou, China cjr22@63.com Distributed denial-of-service (DDoS) attacks present serious threats to servers in the Internet. We argue that the difference of the goals, manners and results of the interaction behaviors of normal flows and attack flows, which show different characteristics on IP addresses and ports. IAI (IP Address Interaction Feature) algorithm is proposed based on the addresses interaction, abrupt traffic change, addresses many-to-one dissymmetry, distributed source IP addresses and concentrated target addresses. The IAI is designed to describe the essential characteristics of network flow states. Furthermore, a support vector machine (SVM) classifier, which is trained by IAI time series from normal flow and attack flow, is applied to classify the state of current network flows and identify the DDoS attacks. The experiment results show that, IAI can reflect the different characteristics of DDoS attack flows and normal flows; the IAI-based detection scheme can distinguish between normal flows and abnormal flows with DDoS attack flows effectively, and help to identify fast and accurate attack flows when the attacking traffic is hidden among a relatively large volume of normal flows or close to the attacking sources, and it has higher detection and lower false alarm rate compared with related works. Index Terms Network Security, Distributed Denial of Service, IP Address Interaction Feature, SVM classifier D I. INTRODUCTION DoS attack is one of the main threats to the Internet. DDoS attack employs many sources to send useless packets towards the target, consumes the available resources of the target, and prevents the target from providing normal services, as depicted in Fig.. DDoS attacks are easy to carry out, more harmful, hard to trace and defense, so it s a great threat. The detection of attacks is an important aspect of DDoS attack defense, and the detection results can affect the overall performance of attack defense. The attackers now tend to use actual source to perform DDoS attacks[] and can launch low-rate DDoS attacks by sending low rate and periodical attack flows [2-3], so it s very difficult to distinguish between normal flows and attack flows, thus a fast and accurate detection is very hard. DDoS attack traffic at the source is highly similar to legitimate traffic and the aggregation attack traffic close to the attack source is relatively small versus massive normal traffic, finally all these attack traffic flows centralize at the target that makes a DDoS attack. The closer the detection sensor gets to the attack source the better defense efficiency, at the same time, the more expensive and difficult to implement, the higher false positive rate and false negative rate. In this paper, we review the existing methods of DDoS attacks, and analyze the goals, manners, results of the interaction behaviors of DDoS attack flows and normal flows and their different characteristics on IP addresses and ports. We find that the number of source IP addresses with interaction behaviors is much larger than the number of source IP addresses without interaction behaviors for normal flows, but the number of source IP addresses without interaction behaviors is much larger than the number of source IP addresses with interaction behaviors for DDoS attack flows, which have abrupt traffic change, addresses many-to-one dissymmetry, distributed source IP addresses, concentrated target addresses. Hence, we give the definition of IF (Interaction Flow) and SH (Source Half Interaction Flow), and propose the IAI (IP Address Interaction Feature) algorithm, which combines the interaction feature of normal flow and multiple inherent features of DDoS attack flows. We establish an IAI-based DDoS detection method by SVM classifier to classify the state of current network flows and identify the DDoS attacks. We also demonstrate that our methods are particularly effective at identifying the abnormal phenomenon caused by DDoS attacks and the false positive rate and false negative rate are lower compared with related works when the detecting sensor is located close to the attacking source or the attacking traffic is hidden among a relatively large volume of normal flows. II. RELATED WORK Most current detection methods can be classified into two categories. Firstly, lots of methods established attack detection model based on a specific attack feature to identify an attack, whenever the current flow is detected and matches the attack detection model, it s considered as an attack flow. These methods can detect certain kinds of attack, thus improve the detection accuracy. However, DDoS attacks are adversarial and constantly evolving. Once a particular kind of attack is successfully detection, a slight variation is designed that bypasses the detection and still performs an effective attack. Hence, DDoS attack detection methods which are based on extracting an attack feature can not detect attack effectively. For example, for the scheme based on the abrupt traffic change [4-7], attacker can organize different sources and simulate normal flow to send out attack flow to hide the statistic characters of attack flow by different time, different types of flow, different size of packets and different sending rate; furthermore, the traffic offset can not distinguish DDoS attack flow from normal network congestion flow. For the scheme based on flow dissymmetry[8-2], real audio/video traffic are highly disproportional, where the monitored traffic from server to client is much higher than from client to server, /9 $ IEEE DOI.9/INCOS

2 alternately, the legitimate connections, which numerous hosts initiate with a popular destination address, is likely perceived as an attack signal. Since their premise is that edge networks are willing to act cooperatively, it is more expensive and difficult to implement. Moreover, attacker may use random spoofing source IP address, or send out the same amount of SYN packets and FIN/RST packets, for a large-scale DDoS attack, the attack traffic from each source network can be very small and unnoticed compared with legitimate traffic flows, thus detecting attack traffic accurately can be difficult or impossible at the source network. For the scheme based on distributed IP addresses [3,4], the closer the detection sensor gets to the attack source, the false positive rate and false negative rate are drastically higher. Secondly, the other ways established detection models based on normal flow feature, such as the similarity in average IP packet length and flow rate or the distribution of IP addresses and ports, whenever the current flow is detected and deviates from the detection model, it s classified as an attacking flow. These methods [5,6] can detect different kinds of attacks. However, it s very difficult to build a stable model for all normal flows. Moreover, the attackers can simulate the normal flows. Recently, the distributed collaborative detection methods and the detection methods based on multiple DDoS attack characteristics are emerging. The distributed collaborative methods [7,8] employ distributed sensors and detect the attacks effectively by collaboration and help to defense, but the deployment is difficult and the performance of the whole system relies on the ability of each sensor. Multiple characteristics based detection methods [9-2] can help to avoid the shortcoming of detection methods based on single attack characteristic. However, that the methods cannot separate attack flows from abnormal flows effectively affects the capability of the methods when the attacking traffic is hidden among a relatively large volume of normal flows. III. IP FLOW FEATURE ANALYSIS To improve the detection quality, the key problem is to extract the essential features of attack flows and separate the attack flows from the abnormal flows, and reduce the interference of normal network traffic. The common characteristics of normal flows and attack flows are they both have the flow interaction behavior, but their interaction behaviors show great difference on IP addresses and ports. Because normal flows are in the hope of obtaining or providing network services by network communication, and most source IP addresses have normal interaction behavior in a certain time interval, whereas the attack flows want to disrupt the network communication and services, thus most source IP addresses have abnormal interaction behavior. Definition. Assume the network flow F in a certain time period T is <(t,s,d,dp ),(t 2,s 2,d 2,dp 2 ),,(t n,s n, d n,dp n )>, where i=,2,,n t i, s i, d i, dp i mean the ith packet s timestamp, source IP address, destination IP address, destination port number. Classify the n packets, and the packets with the same source IP address and the same destination IP address are in the same class. Denote the class of packets with a source IP address A i as IPS(A i ) and the class of packets with a destination IP address A j as IPD(A j ). If there is a source IP address A i makes class IPS(A i ) and class IPD(A i ) non-empty, then IPS(A i ) is called an Interaction Flow (IF) and denoted as IF(A i ). If there is a source IP address A i makes class IPD(A i ) empty, then IPS(A i ) is called an Source Half Interaction Flow (SH and denoted as SH(A i ). Based on the above definition, in a certain time period T, IF are IP flows with interaction behaviors, and SH are IP flows without interaction behaviors. A. Normal flow characteristic The interaction purpose of normal flows is to get or provide service by network communication and most source IP addresses have interaction feature. The interaction mode of the source IP addresses and destination IP addresses in a certain time period T appears to be in one-to-one mode, one-to-many and many-to-one mode. In an ideal world, the result of characteristic statistics turns out to be: in a certain time period T the number M of all IFs is large; while the number S of source IP addresses of all SHs and the number D of destination IP addresses of all SHs will be relatively small, thus (S-D)/M. Network noises or other uncertainty may lead to a loss of packets, delay or dithering. Nevertheless, in time span T, the number of all the SHs is still small and the interaction mode is still not change, moreover, normal flow also obeys the TCP congestion control protocol and packets are sent in a non-congestion time to evade congestion, thus the value of (S-D)/M will have slight dithering in a small interval. B. Attack flow characteristic A typical DDoS attack employs many hosts (Zombie) to flood the target in a distributed and cooperative way, as depicted figure. In order to disrupt normal services and avoid being detection, Zombies will generate a large number of source IP addresses without interaction feature. The interaction mode of the source IP addresses and destination IP addresses turns out to be in many-to-one mode. The result characteristic statistics is: in a certain time period T, the number M of IFs is quite small (even smaller when random spoofing source IP addresses are used), if the attacker uses random port number, the number of destination port number Port(SH(A j )) will exceed the normal range, namely, Port(SH(A j ))>θ/ms θ is the threshold; DDoS attacks also have a distribution of source IP addresses (a large S), a concentration of destination IP address (a small D), an outburst in network traffic (in a time span T, S-D will be large). Moreover, the attack flows do not obey the TCP congestion control protocol and are unresponsive to congestion signals. In every time span T, making a large number of IP source addresses of attack flows with interaction feature at any detection location can be difficult or impossible. When the attack are very serious, the attack flows to the victim will concentrate at congestion time, in a time span T, D, S-D is 4

3 large constant, M, thus (S-D)/M. Fig.. Typical DDoS attack IV. IP ADDRESS INTERACTION FEATURE Based on the characteristics of normal flows and DDoS attack flows, a definition of IP address Interaction Feature is given below. Definition 2. Assume that in time span T, the network flow F is <(t,s,d,dp ),(t 2,s 2,d 2,dp 2 ),,(t n,s n,d n,dp n )>, where i=,2,,n t i, s i, d i, dp i mean the ith packet s timestamp, source IP address, destination IP address, destination port number. Classify these n packets, and obtain all the interaction flow IFs of network flow F as IF, IF 2,, IF m, the number of packets with a source IP address A i in IF i is denoted as sn i where i=,2,,m, the number of the packets of all the IFs is denoted as SN, the source half interaction flow SHs of network flow F as SH, SH 2,, SH s. Classify these s SHs so that the packets with the same destination IP address will be in the same class, denote the number of different source IP addresses as hn i, the class of packets with the same destination IP address A i as HSD(hn i, A i ). Assume all the HSD classes with hn i 2 are HSD, HSD 2,, HSD k, the number of different destination port number in class HSD i is denoted as Port(HSD i ), where i=,2,,k The SE (Interaction Flow Source Address Entropy) is defined as: m sni sni SE = log 2 ( ) () i = SN SN The IAI (IP Address Interaction Feature) is defined as: k f ( SE)( ( hni + over( Port( HSDi))) k) i = IAI F = (2) m + x x> x x/ Δt> θ Where f( x) = over( x) = t is x, x/ Δt θ, the sampling time period, θ is the threshold, which can be the maximum of Port(HSD i ) or a value specified by administrator according to experience in real applications. IAI algorithm separates the half interaction flow SHs and the interaction flow IFs by classified network flows and help to separate attack flows from abnormal flows, and then calculate their characteristic value respectively. Choosing many-to-one HSDs can make use of addresses many-to-one dissymmetry of DDoS attack flow and reduce the interference of SHs due to normal flows. When the attack flow is small, but the normal flows are relatively large, the detection quality is affected, so in equation (2), in order to reduce the interference of IF flows due to normal flows and improve the detection sensitivity of attack flows, SE is introduced and also reflects the distribution of the source IP addresses [3]. However, to prevent a small interaction flow (Se is smaller than ) disturbs the detection quality, f(se) is introduced. Furthermore, according to the conclusions in section 3, () When there is no attack, the number of SHs will be much less than the number of IFs, thus the value of IAI will be very small; (2) When the attack occurs and leads to a denial of service, the number of SHs is much larger than the number of IFs, thus the value of IAI is very large. Hence, IAI can reflect the characteristics of source IP addresses interaction of normal flows, as well as the source IP addresses half interaction, abrupt traffic change, addresses many-to-one dissymmetry, distributed source IP addresses and concentrated destination IP address of DDoS attack flows. V. ATTACK DETECTION METHOD This paper extracts IAI time series from normal network flows and DDoS attack flows to describe their state change of network flows respectively, and establishes a DDoS attack detection model based on IAI by SVM classifier. A. Abnormal Detection Model Sample the network flow F with a period t, and calculate the IAI value after each sampling. A time series sample A can be obtained after sampling N times, A(N, t)={iai i,i=,2,,n}, in which N is the length of the series. When using the IAI time series to describe the characteristics of the state change of network flow F, the problem of attack detection actually becomes a problem of classifying the IAI time series. The SVM can be described as: N η = β iyk i ( ϕi, ϕ) + b (3) i = In which η is the classification result, β i is the Lagrange multipliers, y i is the classification type, y i { -,},K(ϕ i,ϕ) is the kernel function, b is the deviation factor, ϕ i is the classification training data sample, i=,2,,n, ϕ is a sample 5

4 to be determined. The optimal hyperplane that the SVM classifier establishes in higher dimensional characteristic space is: f ( ϕ) = sgn βi yik( ϕi, ϕ) + b (4) i SV Where b = βiyi( K( ϕr, ϕi) + K( ϕs, ϕi)), SV is the 2 i SV support vector ϕ r is any positive support vector ϕ s is any negative support vector. The coefficients can be obtained by quadratic programming: N N N minw ( β) = min βiβ jyiy jk ( ϕi, ϕ j) βi β β 2 (5) N i= i= j= i= s.t. β y =, β C( i =, 2,..., N) i i i in which,β is a vector formed by Lagrange multipliers β i, C is the parameter to price the misclassification. Solving the coefficients of SVM classifier is a typical constrained quadratic optimization problem, there are lots of sophisticated algorithms for solving this kind of problem. In the paper we use the SVM algorithm supposed by J. Platt [22] that can support large-scale data training set. We compared the experimental results from various kernel functions such as linear, ploy, gauss and tanh. The results show that the linear kernel function is the best one. Then the optimal value of the parameter C is obtained through Cross-validation method. B. Alarm Valuation Mechanism Considering that the network flow noise, congestion or some other factors might result in abnormal changes in IAI states of network flows besides the DDoS attack, we present a simple alarm evaluation mechanism based on the alarm frequency and time interval to decrease false alarm rate. It means taking place a DDoS attack in the network when the abnormal changes in IAI states occur frequently in a designed time interval. Hence, the system will only generate alarms when the Num(Num ) anomalies are detected in a designated time interval T( T ). For example, if T and Num, the system will immediately generate an alarm about DDoS attack when one anomaly of IAI states is detected in the current network flows. It is very important to assign the value of T and Num, because that larger T and Num can decrease the false alarm rate, but the time efficiency will be decrease too. Therefore, they need to be set dynamically according to the network security situations to detect DDoS attack. VI. EXPERIMENTS AND RESULTS The experiment used the normal flow data in 999 and DDoS flow data LLDoS2..2 in 2 from MIT Lincoln lab [23]. The normal flow samples were from normal flow data, and the attack flow samples were from DDoS flow data Time Sample Point(/.s) x Time Sample Point(/.s) x Time Sample Point(/.s) x Time Sample Point(/s) of Normal Traffic Time Sample Point(/.s) x 4 25 of Normal Traffic Time Sample Point(/.s) x 4 5 of Normal Traffic Time Sample Point(/.s) x 4 8 of Normal Traffic Time Sample Point(/s) Fig. 2. IAI time series of 999 normal flow When the sampling time period t was.s,.s,.s, s, the IAI time series and the corresponding size of normal traffic were obtained by multiple sampling and calculation depicted in figure 2; When the sampling time period t was.s,.s,.s, s, the IAI time series and the corresponding size of attack traffic were obtained by multiple sampling and calculation depicted in figure 3. From figure 2 & figure 3, we can see that, IAI time series are sensitive to attack flows and they can magnify the size of IFI of the attack flow using randomized destination ports in any attack flow, meanwhile, they are steady when the network flow is normal. As depicted in Fig 3, there are few IAIs which size is smaller than the size of attack traffic, and the main reasons are from two aspects: firstly, in a minor span t, sometimes there is only one attack packet. Secondly, due to the increment of t, the few normal flows responded become IFs. Thus the IAI can well reflect different state features of normal network flow and DDoS attack flow. 6

5 Time Sample Point(/.s) Time Sample Point(/.s) Time Sample Point(/.s) Time Sample Point(/s) of Attack Traff ic Time Sample Point(/.s) of Attack Traffic Time Sample Point(/.s) of Attack Traffic Time Sample Point(/.s) of Attack Traffic Time Sample Point(/s) Fig. 3. IAI time series of LLDoS2..2 network flow We compared our method with previous similar works, one of which is the (Entropy of Feature Distributions, EFD) method [3]. We carried out multiple groups of experiments, and the sampling time period t was set to.s, abnormal alarm time interval T was set to s, the number of anomalies Num was set to, then sample multiple times from the normal flow data, and calculate the IAI time series of normal flows; alternately, mix the normal flows with attack flows and obtain the IAI time series of abnormal flows. As depicted in Fig 4, the vertical axis represents the detection rate and the false positive rate, the horizontal axis represents the amount of normal flows divides the amount of attack flows. Use IAI, EFD methods based on SVM classifier to realize the detection respectively, the results are shown in Fig.4. As the background network flows increase, the detection rate of IAI method drop from % to 98%, the average detection rate is 99.2%, which demonstrate that IAI method can effectively identify the abnormal flows with DDoS attack flows, and is insensitive to large normal background flows, so it can help to realize the effective detection when the attacking traffic is hidden among a relatively large volume of normal flows or close to the attacking sources. The main reasons for false negative are because of the network state shift caused by network random noise. The false alarm rate of IAI method increases from.% to.%, with an average false alarm rate.%. The results show that IAI method can accurately identify normal flow and will not lead to high false positive because of large normal flows. The main reasons for false positive are from two aspects: () The random network noise; (2) Network delay and packet lost. As illustrated in figure 4, with the increment of normal background network flows, the detection rate of EFD gradually decreases from 95.8% to 65.%, the false alarm rate increases from.% to 33.6%, the average detection rate of groups is 79.7% and the average false alarm rate is 2.5%. EFD is designed to extract distributed IP addresses features of DDoS attack using four-dimensional characteristic vector and calculate the features value without distinguishing the normal flows from attack flows. But IAI is designed to extract the source IP addresses interaction feature of normal flow and five inherent features of DDoS attack flow using one-dimensional characteristic vector and it can help to separate attack flows and normal flows effectively and calculate their characteristic values respectively so as to reduce the interference of normal flows effectively. For a large-scale DDoS attack, the closer the detection sensor gets to the attack source, the less the attack flows versus normal flows. By comparison, IAI method has a higher detection rate and lower false positive rate, which is more suitable for the detection when the attacking traffic is hidden among a relatively large volume of normal flows or close to the attacking sources. % False Alarm Rate and Detection Rate False Alarm Rate of IAI Detection Rate of IAI False Alarm Rate of EFD Detection Rate of EFD Increase Multiple of Network Flow Fig. 4. False alarm rate and detection rate of different algorithm As discussed above, IAI can well reflect different essential characteristics of DDoS attack flow and normal flow, which is useful for distinguishing normal flows from DDoS attack flows. IAI method can effectively identify the abnormal flows caused by DDoS attacks, based on real-time calculation of the IAI value of network flows, it can realize a fast and effective detection when the attacking traffic is hidden among a relatively large volume of normal flows or close to the attacking sources. Our method can be deployed on attack 7

6 source, media and terminal equipments. VII. CONCLUSIONS DDoS attacks can cause severe disruption to the stability of the Internet. In this paper, we have presented a novel IP Address Interaction Feature (IAI) algorithm, which is based on the source addresses interaction of normal flow and the source addresses half interaction, abrupt traffic change, addresses many-to-one dissymmetry, distributed source IP addresses and concentrated target addresses of DDoS attack flow. Using the IAI feature and SVM, we also proposed a simple but effective DDoS detection method. This method uses the IAI time series to describe the state characteristics of network flows, and then a detection of DDoS attack flows is indeed a classification problem of IAI time series. Using the training samples obtained from the normal flows and attack flows to train SVM classifier, and then use them to classify the current network flows and detect DDoS attacks. Analysis and experiments show that: the IAI feature can well describe the source address interaction feature of normal flow and multiple inherent characteristics of DDoS attack flow; our method can effectively recognize the abnormal phenomenon caused by DDoS attack flows, and have lower false positive rate and false negative rate compared with related works when the attacking traffic is hidden among a relatively large volume of normal flows or close to the attacking sources, and reduce the false positive rate. In the future, we will explore on how to use our method to defense the DDoS attacks. ACKNOWLEDGMENT This work is supported by National Science Foundation of China(69734, 66362, 6635), Scientific Research Fund of Hunan Provincial Education Department (7C78), the Foundation for the Author of National Excellent Doctoral Dissertation (27B4), Science Foundation of Hunan Provincial (6JJ335), and Application of Innovation Plan Fund of the Ministry of Public Security (27YYCXHNST72). REFERENCES [] Handley M. DoS-resistant Internet subgroup report. Internet Architecture WG. Tech Rep: Available online at mmary.pdf. 25. [2] Macia G, Diaz J, Garcia P. Evaluation of a low-rate DoS attack against application servers [J]. Computers & Security, 28, 27(7-8): [3] Kumar V, Jayalekshmy P, Patra G, et al. On Remote Exploitation of TCP Sender for Low-Rate Flooding Denial-of-Service Attack [J]. IEEE Communications Letters, 29, 3(): [4] Cheng C, Kung H, Tan K. Use of spectral analysis in defense against DoS attacks [C]. In Proceedings of IEEE GLOBECOM [5] Manikopoulos C, Papavassiliou S. Network intrusion and fault detection: A statistical anomaly approach [C]. IEEE Communications Magazine [6] Lakhina A, Crovella M, Diot C. Diagnosing Network-Wide Traffic Anomalies [C]. In Proceedings of ACM SIGCOMM, Portland, Oregon, USA, August 24. [7] Sanguk N, Gihyun J, Kyunghee C, ea al. Compiling network traffic into rules using soft computing methods for the detection of flooding attacks [J]. Applied Soft Computing [8] Gil T, Poletto M. MULTOPS: A data-structure for bandwidth attack detection. In Proceedings of the th USENIX Security Symposium. 2. [9] Abdelsayed S, Glimsholt D, Leckie C, et al. An efficient filter for denial-of service bandwidth attacks [C]. In Proceedings of the 46th IEEE GLOBECOM [] Wang H, Zhang D, Shin K. Detecting SYN flooding attacks [C]. In Proceedings of IEEE INFOCOM [] Mirkovic J, WANG M, REITHER P, et al. Save: Source address validity enforcement protocol. In Proceedings of IEEE INFOCOM [2] Mirkovic J, and Reiher P. D-WARD: A Source-End Defense Against Flooding Denial-of-ServiceAttacks," IEEE Trans. on Dependable and SecureComputing, Vol. 2, No. 3, July 25, pp [3] Lakhina A, Crovella M, and Diot C. Mining Anomalies Using Traffic Feature Distributions [C]. In Proceedings of ACM SIGCOMM, Philadelphia, Pennsylvania, USA, 25. [4] Peng T, Leckie C, Kotagiri R. Proactively detecting distributed denial of service attacks using source IP address monitoring [C]. In Proceedings of the Third International IFIP-TC6 Networking Conference, [5] Manikopoulos C, Papavassiliou S. Network intrusion and fault detection: A statistical anomaly approach [J]. IEEE Commun. Mag. 22.4(): [6] Forrest S, Hofmeyr S. Architecture for an artificial immune system [J]. Evolutionary Computation, (): [7] Chen Y, Hwang K, and Ku W. Collaborative Detection of DDoS Attacks over Multiple Network Domains [J]. IEEE Trans. on Parallel and Distributed Systems, 27. [8] Chenfeng V, Christopher L, Shanika K. Decentralized multi-dimensional alarm correlation for collaborative intrusion detection. Journal of Network and Computer Applications. 29. [9] Cheng J, Yin J, Liu Y, ea al. Detecting Distributed Denial of Service Attack Based on Address Correlation Value [J]. Journal of Computer Research and Development, 29. [2] Cheng J, Yin J, Liu Y, ea al. DDoS Attack Detection Method Based on Linear Prediction Model. [C]. In Proceedings of FAW, LNCS [2] Cheng J, Yin J, Wu C, ea al. DDoS Attack Detection Method Based on Linear Prediction Model. [C]. In Proceedings of ICIC, LNCS [22] Platt J. Sequential minimal optimization: A fast algorithm for training support vector machines. Microsoft Research, Tech Rep: MSR-TR-98-4, 998. [23] dex.html. Cheng Jieren, Received his M.S. degree in Computer Science from National University of Defense Technology (NUDT), China, in 25. Now he is a Ph.D. candidate of Computer Science in NUDT and student membership of CCF, His main research interests include network security and artificial intelligence. 8

Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks*

Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks* Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks* Wei Wei 1, Yabo Dong 1, Dongming Lu 1, and Guang Jin 2 1 College of Compute Science and Technology,

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ISSN: 2229-6948 (ONLINE) ICTACT JOURNAL OF COMMUNICATION TECHNOLOGY, JUNE 2010, VOLUME: 01, ISSUE: 02 DOI: 10.21917/ijct.2010.0013 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING

More information

Experience with SPM in IPv6

Experience with SPM in IPv6 Experience with SPM in IPv6 Mingjiang Ye, Jianping Wu, and Miao Zhang Department of Computer Science, Tsinghua University, Beijing, 100084, P.R. China yemingjiang@csnet1.cs.tsinghua.edu.cn {zm,jianping}@cernet.edu.cn

More information

CLASSIFICATION OF LINK BASED IDENTIFICATION RESISTANT TO DRDOS ATTACKS

CLASSIFICATION OF LINK BASED IDENTIFICATION RESISTANT TO DRDOS ATTACKS CLASSIFICATION OF LINK BASED IDENTIFICATION RESISTANT TO DRDOS ATTACKS 1 S M ZAHEER, 2 V.VENKATAIAH 1 M.Tech, Department of CSE, CMR College Of Engineering & Technology, Kandlakoya Village, Medchal Mandal,

More information

An Efficient and Practical Defense Method Against DDoS Attack at the Source-End

An Efficient and Practical Defense Method Against DDoS Attack at the Source-End An Efficient and Practical Defense Method Against DDoS Attack at the Source-End Yanxiang He Wei Chen Bin Xiao Wenling Peng Computer School, The State Key Lab of Software Engineering Wuhan University, Wuhan

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

DDOS Attack Prevention Technique in Cloud

DDOS Attack Prevention Technique in Cloud DDOS Attack Prevention Technique in Cloud Priyanka Dembla, Chander Diwaker CSE Department, U.I.E.T Kurukshetra University Kurukshetra, Haryana, India Email: priyankadembla05@gmail.com Abstract Cloud computing

More information

Measuring Defence Systems Against Flooding Attacks

Measuring Defence Systems Against Flooding Attacks Measuring Defence Systems Against Flooding Attacks Martine Bellaïche Génie Informatique, Ecole Polytechnique de Montréal Montréal, QC, CANADA email: martine.bellaiche@polymtl.ca Jean-Charles Grégoire INRS

More information

DDoS Attacks Detection Using GA based Optimized Traffic Matrix

DDoS Attacks Detection Using GA based Optimized Traffic Matrix 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing DDoS Attacks Detection Using GA based Optimized Traffic Matrix Je Hak Lee yitsup2u@gmail.com Dong

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN ------------------- CHAPTER 4 DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN In this chapter, MAC layer based defense architecture for RoQ attacks in Wireless LAN

More information

Multivariate Correlation Analysis based detection of DOS with Tracebacking

Multivariate Correlation Analysis based detection of DOS with Tracebacking 1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor

More information

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks Journal of Computer Science Original Research Paper Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks 1 Ayyamuthukumar, D. and 2 S. Karthik 1 Department of CSE,

More information

Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation

Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation Monowar H. Bhuyan and Abhishek Kalwar Dept. of Computer Science & Engg. Kaziranga University, Jorhat-785006, Assam

More information

EFFECT OF HALF-OPEN CONNECTION LIFETIME IN DEFENDING AGAINST DDOS ATTACK

EFFECT OF HALF-OPEN CONNECTION LIFETIME IN DEFENDING AGAINST DDOS ATTACK International Journal on Information Sciences and Computing, Vol.3, No.2, July 2009 33 EFFECT OF HALF-OPEN CONNECTION LIFETIME IN DEFENDING AGAINST DDOS ATTACK 1 2 S.Meenakshi, Dr.S.K.Srivatsa, 1 Assistant

More information

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric HeyShanthiniPandiyaKumari.S 1, Rajitha Nair.P 2 1 (Department of Computer Science &Engineering,

More information

Intrusion Detection with CUSUM for TCP-Based DDoS

Intrusion Detection with CUSUM for TCP-Based DDoS Intrusion Detection with CUSUM for TCP-Based DDoS Fang-Yie Leu and Wei-Jie Yang Department of Computer Science and Information Engineering, Tunghai University, Taiwan leufy@thu.edu.tw Abstract. DDoS(Distributed

More information

DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis

DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis DDoS Attack Detection Using Moment in Statistics with Discriminant Analysis Pradit Pitaksathienkul 1 and Pongpisit Wuttidittachotti 2 King Mongkut s University of Technology North Bangkok, Thailand 1 praditp9@gmail.com

More information

DDoS Detection in SDN Switches using Support Vector Machine Classifier

DDoS Detection in SDN Switches using Support Vector Machine Classifier Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) DDoS Detection in SDN Switches using Support Vector Machine Classifier Xue Li1, a *, Dongming Yuan2,b, Hefei

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

ANOMALY DETECTION USING HOLT-WINTERS FORECAST MODEL

ANOMALY DETECTION USING HOLT-WINTERS FORECAST MODEL ANOMALY DETECTION USING HOLT-WINTERS FORECAST MODEL Alex Soares de Moura RNP Rede Nacional de Ensino e Pesquisa Rua Lauro Müller, 116 sala 1103 Rio de Janeiro, Brazil alex@rnp.br Sidney Cunha de Lucena

More information

A Two-phase Distributed Training Algorithm for Linear SVM in WSN

A Two-phase Distributed Training Algorithm for Linear SVM in WSN Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear

More information

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS Andry Putra Fajar and Tito Waluyo Purboyo Faculty of Electrical Engineering,

More information

2 An Integrated Victim-based Approach Against IP Packet Flooding Denial of Service

2 An Integrated Victim-based Approach Against IP Packet Flooding Denial of Service 2 An Integrated Victim-based Approach Against IP Packet Flooding Denial of Service Ruth M. Mutebi, Department of Networks, Faculty of Computing and IT Makerere University, Uganda, rmbabazi@tech.mak.ac.ug

More information

PPF Model with CTNT to Defend Web Server from DDoS Attack*

PPF Model with CTNT to Defend Web Server from DDoS Attack* PPF Model with CTNT to Defend Web Server from DDoS Attack* Jungtaek Seo 1, Cheolho Lee 1, Jungtae Kim 2, Taeshik Shon 3, and Jongsub Moon 3 1 National Security Research Institute, KT 463-1, Jeonmin-dong,

More information

Towards Traffic Anomaly Detection via Reinforcement Learning and Data Flow

Towards Traffic Anomaly Detection via Reinforcement Learning and Data Flow Towards Traffic Anomaly Detection via Reinforcement Learning and Data Flow Arturo Servin Computer Science, University of York aservin@cs.york.ac.uk Abstract. Protection of computer networks against security

More information

Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average

Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average Tae Hwan Kim 1, Dong Seong Kim 2, Sang Min Lee 1, and Jong Sou Park 1 1 Dept. of Computer Engineering, Korea Aerospace

More information

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK P.Priya 1, S.Tamilvanan 2 1 M.E-Computer Science and Engineering Student, Bharathidasan Engineering College, Nattrampalli. 2

More information

Detecting Distributed Denial of Service (DDoS) Attacks Through Inductive Learning

Detecting Distributed Denial of Service (DDoS) Attacks Through Inductive Learning Detecting Distributed Denial of Service (DDoS) Attacks Through Inductive Learning Sanguk Noh 1, Cheolho Lee 2, Kyunghee Choi 2, Gihyun Jung 3 1 School of Computer Science and information Engineering, The

More information

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 02, ISSUE 01, JAN 2014

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 02, ISSUE 01, JAN 2014 INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 02, ISSUE 01, JAN 2014 ISSN 2321 8665 LOW BANDWIDTH DDOS ATTACK DETECTION IN THE NETWORK 1 L. SHIVAKUMAR, 2 G. ANIL KUMAR 1 M.Tech CSC Dept, RVRIET,

More information

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK Abinesh Kamal K. U. and Shiju Sathyadevan Amrita Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa

More information

Research on adaptive network theft Trojan detection model Ting Wu

Research on adaptive network theft Trojan detection model Ting Wu International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 215) Research on adaptive network theft Trojan detection model Ting Wu Guangdong Teachers College of Foreign

More information

Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics

Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics Li, Ke, Zhou, Wanlei, Li, Ping, Hai, Jing and Liu, Jianwen 2009, Distinguishing DDoS attacks from flash crowds using probability metrics, in NSS 2009 : Proceedings of the third International Conference

More information

Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory

Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory Copyright 2018 Tech Science Press CMC, vol.57, no.2, pp.297-306, 2018 Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory Chak Fong Cheang 1, *, Yiqin Wang 1, Zhiping Cai 2 and

More information

NETWORK TRAFFIC ANALYSIS - A DIFFERENT APPROACH USING INCOMING AND OUTGOING TRAFFIC DIFFERENCES

NETWORK TRAFFIC ANALYSIS - A DIFFERENT APPROACH USING INCOMING AND OUTGOING TRAFFIC DIFFERENCES NETWORK TRAFFIC ANALYSIS - A DIFFERENT APPROACH USING INCOMING AND OUTGOING TRAFFIC DIFFERENCES RENATO PREIGSCHADT DE AZEVEDO, DOUGLAS CAMARGO FOSTER, RAUL CERETTA NUNES, ALICE KOZAKEVICIUS Universidade

More information

IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks

IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks 1274 IEICE TRANS. INF. & SYST., VOL.E91-D, NO.5 MAY 2008 PAPER Special Section on Information and Communication System Security IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks Ping

More information

1.1 SYMPTOMS OF DDoS ATTACK:

1.1 SYMPTOMS OF DDoS ATTACK: 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Entropy Based Approach for the Detection of DDOS Attack Abhilash Singh,

More information

Chapter 7. Denial of Service Attacks

Chapter 7. Denial of Service Attacks Chapter 7 Denial of Service Attacks DoS attack: An action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU),

More information

A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS

A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS ISSN: 2229-6948(ONLINE) DOI: 10.21917/ijct.2013.0105 ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2013, VOLUME: 04, ISSUE: 02 A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED

More information

Challenges in Mobile Ad Hoc Network

Challenges in Mobile Ad Hoc Network American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

A study on fuzzy intrusion detection

A study on fuzzy intrusion detection A study on fuzzy intrusion detection J.T. Yao S.L. Zhao L. V. Saxton Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: [jtyao,zhao200s,saxton]@cs.uregina.ca

More information

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks So we are proposing a network intrusion detection system (IDS) which uses a Keywords: DDoS (Distributed Denial

More information

An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network

An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network Lizhong Xie, Jun Bi, and Jianpin Wu Network Research Center, Tsinghua University, Beijing, 100084, China

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 8 Denial of Service First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Denial of Service denial of service (DoS) an action

More information

IP Traceback Based on Chinese Remainder Theorem

IP Traceback Based on Chinese Remainder Theorem IP Traceback Based on Chinese Remainder Theorem LIH-CHYAU WUU a, CHI-HSIANG HUNG b AND JYUN-YAN YANG a a Department of Computer Science and Information Engineering National Yunlin University of Science

More information

A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo

A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo Beijing University of

More information

Toward a Source Detection of Botclouds: a PCA-based Approach

Toward a Source Detection of Botclouds: a PCA-based Approach Toward a Source Detection of Botclouds: a PCA-based Approach Badis HAMMI Guillaume DOYEN Rida KHATOUN Autonomous Network Environment (ERA) team Troyes University of Technology (UTT) CNRS UMR 6281 ICD Contrôle

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

Optimization of Firewall Rules

Optimization of Firewall Rules Optimization of Firewall Rules Tihomir Katić Predrag Pale Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia tihomir.katic@fer.hr predrag.pale@fer.hr

More information

A New Logging-based IP Traceback Approach using Data Mining Techniques

A New Logging-based IP Traceback Approach using Data Mining Techniques using Data Mining Techniques Internet & Multimedia Engineering, Konkuk University, Seoul, Republic of Korea hsriverv@gmail.com, kimsr@konuk.ac.kr Abstract IP Traceback is a way to search for sources of

More information

UNDERSTANDING AND EVALUATING THE IMPACT OF SAMPLING ON ANOMALY DETECTION TECHNIQUES

UNDERSTANDING AND EVALUATING THE IMPACT OF SAMPLING ON ANOMALY DETECTION TECHNIQUES UNDERSTANDING AND EVALUATING THE IMPACT OF SAMPLING ON ANOMALY DETECTION TECHNIQUES Georgios Androulidakis, Vasilis Chatzigiannakis, Symeon Papavassiliou, Mary Grammatikou and Vasilis Maglaris Network

More information

DETECTION OF NETWORK ANOMALIES USING RANK TESTS

DETECTION OF NETWORK ANOMALIES USING RANK TESTS DETECTION OF NETWORK ANOMALIES USING RANK TESTS Céline Lévy-Leduc CNRS/LTCI/Télécom ParisTech 37/39, Rue Dareau - 754 Paris - Email: celine.levy-leduc@telecom-paristech.fr ABSTRACT We propose a novel and

More information

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM Anburaj. S 1, Kavitha. M 2 1,2 Department of Information Technology, SRM University, Kancheepuram, India. anburaj88@gmail.com,

More information

A Comparison Between the Silhouette Index and the Davies-Bouldin Index in Labelling IDS Clusters

A Comparison Between the Silhouette Index and the Davies-Bouldin Index in Labelling IDS Clusters A Comparison Between the Silhouette Index and the Davies-Bouldin Index in Labelling IDS Clusters Slobodan Petrović NISlab, Department of Computer Science and Media Technology, Gjøvik University College,

More information

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 02, ISSUE 01, JAN 2014 ISSN

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGIES, VOL. 02, ISSUE 01, JAN 2014 ISSN CONSTANT INCREASE RATE DDOS ATTACKS DETECTION USING IP TRACE BACK AND INFORMATION DISTANCE METRICS 1 VEMULA GANESH, 2 B. VAMSI KRISHNA 1 M.Tech CSE Dept, MRCET, Hyderabad, Email: vmlganesh@gmail.com. 2

More information

Spoofing Detection in Wireless Networks

Spoofing Detection in Wireless Networks RESEARCH ARTICLE OPEN ACCESS Spoofing Detection in Wireless Networks S.Manikandan 1,C.Murugesh 2 1 PG Scholar, Department of CSE, National College of Engineering, India.mkmanikndn86@gmail.com 2 Associate

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

Clustering Analysis for Malicious Network Traffic

Clustering Analysis for Malicious Network Traffic Clustering Analysis for Malicious Network Traffic Jie Wang, Lili Yang, Jie Wu and Jemal H. Abawajy School of Information Science and Engineering, Central South University, Changsha, China Email: jwang,liliyang@csu.edu.cn

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100 You should worry if you are below this point Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /0 * 100 o Optimistic: (Your

More information

Simulation Environment for Investigation of Cooperative Distributed Attacks and Defense

Simulation Environment for Investigation of Cooperative Distributed Attacks and Defense Simulation Environment for Investigation of Cooperative Distributed Attacks and Defense Igor Kotenko, Alexander Ulanov Computer Security Research Group, St. Petersburg Institute for Informatics and Automation

More information

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c 2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 215) Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai

More information

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing Yuki Katsurai *, Yoshitaka Nakamura **, and Osamu Takahashi ** * Graduate School

More information

Hardware Supports for Network Traffic Anomaly Detection

Hardware Supports for Network Traffic Anomaly Detection Hardware Sups for Network Traffic Anomaly Detection Dae-won Kim and Jin-tae Oh Electronics and Telecommunications Research Institute in Korea Abstract - Modern network systems are plagued with unknown

More information

Classification with Class Overlapping: A Systematic Study

Classification with Class Overlapping: A Systematic Study Classification with Class Overlapping: A Systematic Study Haitao Xiong 1 Junjie Wu 1 Lu Liu 1 1 School of Economics and Management, Beihang University, Beijing 100191, China Abstract Class overlapping has

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN 2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Face Recognition Using Vector Quantization Histogram and Support Vector Machine

More information

Protocol Share Based Traffic Rate Analysis (PSBTRA) for UDP Bandwidth Attack

Protocol Share Based Traffic Rate Analysis (PSBTRA) for UDP Bandwidth Attack Protocol Share Based Traffic Rate Analysis (PSBTRA) for UDP Bandwidth Attack Zohair Ihsan, Mohd. Yazid Idris *, Khalid Hussain, Deris Stiawan, and Khalid Mahmood Awan Faculty of Computer Science and Information

More information

Detecting Distributed Denial-of-Service Attacks by analyzing TCP SYN packets statistically

Detecting Distributed Denial-of-Service Attacks by analyzing TCP SYN packets statistically Detecting Distributed Denial-of-Service Attacks by analyzing TCP SYN packets statistically Yuichi Ohsita Graduate School of Information Science and Technology, Osaka University 1-3 Machikaneyama, Toyonaka,

More information

DDoS Attacks Classification using Numeric Attribute-based Gaussian Naive Bayes

DDoS Attacks Classification using Numeric Attribute-based Gaussian Naive Bayes DDoS Attacks Classification using Numeric Attribute-based Gaussian Naive Bayes Abdul Fadlil Department of Electrical Engineering Ahmad Dahlan University Yogyakarta, Indonesia Imam Riadi Department of Information

More information

A Novel Image Classification Model Based on Contourlet Transform and Dynamic Fuzzy Graph Cuts

A Novel Image Classification Model Based on Contourlet Transform and Dynamic Fuzzy Graph Cuts Appl. Math. Inf. Sci. 6 No. 1S pp. 93S-97S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Novel Image Classification Model Based

More information

Network Security. Chapter 0. Attacks and Attack Detection

Network Security. Chapter 0. Attacks and Attack Detection Network Security Chapter 0 Attacks and Attack Detection 1 Attacks and Attack Detection Have you ever been attacked (in the IT security sense)? What kind of attacks do you know? 2 What can happen? Part

More information

Various Anti IP Spoofing Techniques

Various Anti IP Spoofing Techniques Various Anti IP Spoofing Techniques Sonal Patel, M.E Student, Department of CSE, Parul Institute of Engineering & Technology, Vadodara, India Vikas Jha, Assistant Professor, Department of CSE, Parul Institute

More information

Fast and Evasive Attacks: Highlighting the Challenges Ahead

Fast and Evasive Attacks: Highlighting the Challenges Ahead Fast and Evasive Attacks: Highlighting the Challenges Ahead Moheeb Rajab, Fabian Monrose, and Andreas Terzis Computer Science Department Johns Hopkins University Outline Background Related Work Sampling

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 360 A Review: Denial of Service and Distributed Denial of Service attack Sandeep Kaur Department of Computer

More information

DENIAL OF SERVICE ATTACKS

DENIAL OF SERVICE ATTACKS DENIAL OF SERVICE ATTACKS Ezell Frazier EIS 4316 November 6, 2016 Contents 7.1 Denial of Service... 2 7.2 Targets of DoS attacks... 2 7.3 Purpose of flood attacks... 2 7.4 Packets used during flood attacks...

More information

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

Open Access Research on the Prediction Model of Material Cost Based on Data Mining Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining

More information

A Defense System for DDoS Application Layer Attack Based on User Rating

A Defense System for DDoS Application Layer Attack Based on User Rating 4th International Conference on Advanced Materials and Information Technology Processing (AMITP 216) A Defense System for DDoS Application Layer Attack Based on User Rating Gaojun Jiang1, a, Zhengping

More information

COMPARISON OF THE ACCURACY OF BIVARIATE REGRESSION AND BOX PLOT ANALYSIS IN DETECTING DDOS ATTACKS

COMPARISON OF THE ACCURACY OF BIVARIATE REGRESSION AND BOX PLOT ANALYSIS IN DETECTING DDOS ATTACKS International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 12, Dec 2015, pp. 43-48, Article ID: IJECET_06_12_007 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=12

More information

The Analysis of Traffic of IP Packets using CGH. Self Organizing Map

The Analysis of Traffic of IP Packets using CGH. Self Organizing Map 2015 International Conference on Computational Science and Computational Intelligence The Analysis of Traffic of IP Packets using CGH Self Organizing Maps Hiroshi Dozono Department of Advanced Fusion Saga

More information

An Adaptive Neuron AQM for a Stable Internet

An Adaptive Neuron AQM for a Stable Internet An Adaptive Neuron AQM for a Stable Internet Jinsheng Sun and Moshe Zukerman The ARC Special Research Centre for Ultra-Broadband Information Networks, Department of Electrical and Electronic Engineering,

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS

EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS Emil Kuriakose John 1 and Sumaiya Thaseen 2 1 School of Information Technology and Engineering, VIT University, Vellore, Tamil Nadu, India ekj171@gmail.com

More information

Review of Multistage Cyber Attack

Review of Multistage Cyber Attack Review of Multistage Cyber Attack Kuldeep Singh Priyanka Singh Pradeep Kumar Singh Dept. of CS & E Dept. of CS & E Assistant Professor Amity University Amity University Dept. of CS & E Noida, U.P, INDIA

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Channel-Adaptive Error Protection for Scalable Audio Streaming over Wireless Internet

Channel-Adaptive Error Protection for Scalable Audio Streaming over Wireless Internet Channel-Adaptive Error Protection for Scalable Audio Streaming over Wireless Internet GuiJin Wang Qian Zhang Wenwu Zhu Jianping Zhou Department of Electronic Engineering, Tsinghua University, Beijing,

More information

Bayesian Learning Networks Approach to Cybercrime Detection

Bayesian Learning Networks Approach to Cybercrime Detection Bayesian Learning Networks Approach to Cybercrime Detection N S ABOUZAKHAR, A GANI and G MANSON The Centre for Mobile Communications Research (C4MCR), University of Sheffield, Sheffield Regent Court, 211

More information

Hydraulic pump fault diagnosis with compressed signals based on stagewise orthogonal matching pursuit

Hydraulic pump fault diagnosis with compressed signals based on stagewise orthogonal matching pursuit Hydraulic pump fault diagnosis with compressed signals based on stagewise orthogonal matching pursuit Zihan Chen 1, Chen Lu 2, Hang Yuan 3 School of Reliability and Systems Engineering, Beihang University,

More information

Challenging the Supremacy of Traffic Matrices in Anomaly Detection

Challenging the Supremacy of Traffic Matrices in Anomaly Detection Challenging the Supremacy of Matrices in Detection ABSTRACT Augustin Soule Thomson Haakon Ringberg Princeton University Multiple network-wide anomaly detection techniques proposed in the literature define

More information

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data Nian Zhang and Lara Thompson Department of Electrical and Computer Engineering, University

More information

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL CONTENTS EXECUTIVE SUMMARY 1 WEB APPLICATION SECURITY CHALLENGES 2 INSIST ON BEST-IN-CLASS CORE CAPABILITIES 3 HARNESSING ARTIFICIAL INTELLIGENCE

More information

Network Traffic Anomaly Detection based on Ratio and Volume Analysis

Network Traffic Anomaly Detection based on Ratio and Volume Analysis 190 Network Traffic Anomaly Detection based on Ratio and Volume Analysis Hyun Joo Kim, Jung C. Na, Jong S. Jang Active Security Technology Research Team Network Security Department Information Security

More information

Flow-based Worm Detection using Correlated Honeypot Logs

Flow-based Worm Detection using Correlated Honeypot Logs Flow-based Worm Detection using Correlated Honeypot Logs Falko Dressler, Wolfgang Jaegers, and Reinhard German Computer Networks and Communication Systems, University of Erlangen, Martensstr. 3, 91058

More information

Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine

Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser Motivation Spam: More than Just a

More information

Mapping Internet Sensors with Probe Response Attacks

Mapping Internet Sensors with Probe Response Attacks Mapping Internet Sensors with Probe Response Attacks John Bethencourt, Jason Franklin, and Mary Vernon {bethenco, jfrankli, vernon}@cs.wisc.edu Computer Sciences Department University of Wisconsin, Madison

More information

NETWORK FAULT DETECTION - A CASE FOR DATA MINING

NETWORK FAULT DETECTION - A CASE FOR DATA MINING NETWORK FAULT DETECTION - A CASE FOR DATA MINING Poonam Chaudhary & Vikram Singh Department of Computer Science Ch. Devi Lal University, Sirsa ABSTRACT: Parts of the general network fault management problem,

More information

Prof. N. P. Karlekar Project Guide Dept. computer Sinhgad Institute of Technology

Prof. N. P. Karlekar Project Guide Dept. computer Sinhgad Institute of Technology Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Advance Deterministic

More information