DDoS attack detection method using cluster analysis

被引:155
作者
Lee, Keunsoo [1 ]
Kim, Juhyun [1 ]
Kwon, Ki Hoon [1 ]
Han, Younggoo [1 ]
Kim, Sehun [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Dept Ind Engn, Taejon 305701, South Korea
关键词
DDoS; proactive detection; security; cluster analysis;
D O I
10.1016/j.eswa.2007.01.040
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Distributed Denial of Service (DDoS) attacks generate enormous packets by a large number of agents and can easily exhaust the computing and communication resources of a victim within a short period of time. In this paper, we propose a method for proactive detection of DDoS attack by exploiting its architecture which consists of the selection of handlers and agents, the communication and compromise, and attack. We look into the procedures of DDoS attack and then select variables based on these features. After that, we perform cluster analysis for proactive detection of the attack. We experiment with 2000 DARPA Intrusion Detection Scenario Specific Data Set in order to evaluate our method. The results show that each phase of the attack scenario is partitioned well and we can detect precursors of DDoS attack as well as the attack itself. (C) 2007 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1659 / 1665
页数:7
相关论文
共 24 条
[1]  
AKELLA A, 2003, ACM SIGMODIPODS WORK
[2]  
CABRERA JBD, 2001, P 7 IFIP IEEE INT S
[3]  
*COMP EM RESP TEAM, 1999, RES DISTR SYST INTR
[4]  
Criscuolo P.J, 2000, Technical Report
[5]   Statistical approaches to DDoS attack detection and response [J].
Feinstein, L ;
Schnackenberg, D ;
Balupari, R ;
Kindred, D .
DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, :303-314
[6]   Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features [J].
Gavrilis, D ;
Dermatas, E .
COMPUTER NETWORKS, 2005, 48 (02) :235-245
[7]   PAID: A Probabilistic Agent-Based Intrusion Detection system [J].
Gowadia, V ;
Farkas, C ;
Valtorta, M .
COMPUTERS & SECURITY, 2005, 24 (07) :529-545
[8]  
Haykin S., 1994, Neural networks: a comprehensive foundation
[9]  
Houle Kevin J., 2001, Trends in denial of service attack technology
[10]  
Institute SAS, 1990, SAS STAT US GUID VER, V1