Adaptive EWMA Method Based on Abnormal Network Traffic for LDoS Attacks

被引:27
作者
Tang, Dan [1 ]
Chen, Kai [1 ]
Chen, XiaoSu [1 ]
Liu, Huiyu [1 ]
Li, Xinhua [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
关键词
Electric current measurement;
D O I
10.1155/2014/496376
中图分类号
T [工业技术];
学科分类号
120111 [工业工程];
摘要
The low-rate denial of service (LDoS) attacks reduce network services capabilities by periodically sending high intensity pulse data flows. For their concealed performance, it is more difficult for traditional DoS detection methods to detect LDoS attacks; at the same time the accuracy of the current detection methods for LDoS attacks is relatively low. As the fact that LDoS attacks led to abnormal distribution of the ACK traffic, LDoS attacks can be detected by analyzing the distribution characteristics of ACK traffic. Then traditional EWMA algorithm which can smooth the accidental error while being the same as the exceptional mutation may cause some misjudgment; therefore a new LDoS detection method based on adaptive EWMA (AEWMA) algorithm is proposed. The AEWMA algorithm which uses an adaptive weighting function instead of the constant weighting of EWMA algorithm can smooth the accidental error and retain the exceptional mutation. So AEWMA method is more beneficial than EWMA method for analyzing and measuring the abnormal distribution of ACK traffic. The NS2 simulations show that AEWMA method can detect LDoS attacks effectively and has a low false negative rate and a false positive rate. Based on DARPA99 datasets, experiment results show that AEWMA method is more efficient than EWMA method.
引用
收藏
页数:11
相关论文
共 21 条
[1]
Wavelet analysis of long-range-dependent traffic [J].
Abry, P ;
Veitch, D .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (01) :2-15
[2]
[Anonymous], NETW DISTR SYST SEC
[3]
An adaptive exponentially weighted moving average control chart [J].
Capizzi, G ;
Masarotto, G .
TECHNOMETRICS, 2003, 45 (03) :199-207
[4]
Chen K, 2012, PROCEEDING OF THE IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, P911, DOI 10.1109/ICInfA.2012.6246912
[5]
Detecting LDoS Attacks based on Abnormal Network Traffic [J].
Chen, Kai ;
Liu, HuiYu ;
Chen, XiaoSu .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (07) :1831-1853
[6]
Chen Y., 2005, ACM T INFORM SYSTEM, V30, P1, DOI DOI 10.1016/J.JPDC.2006.04.007
[7]
Cyber Systems and Technology Group, 1999, 1999 DARPA INTR DET
[8]
Fall Kevin., 2009, The ns manual
[9]
Guirguis M, 2005, IEEE INFOCOM SER, P1362
[10]
Exploiting the transients of adaptation for RoQ attacks on Internet resources [J].
Guirguis, M ;
Bestavros, A ;
Matta, I .
12TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS - PROCEEDINGS, 2004, :184-195