Statistical approaches to DDoS attack detection and response

被引:158
作者
Feinstein, L [1 ]
Schnackenberg, D [1 ]
Balupari, R [1 ]
Kindred, D [1 ]
机构
[1] Boeing Co, Phantom Works, Seattle, WA 98124 USA
来源
DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS | 2003年
关键词
D O I
10.1109/discex.2003.1194894
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These methods must be deployed not only at the edge but also at the core of the network. This paper presents methods to identify DDoS attacks by computing entropy and frequency-sorted distributions of selected packet attributes. The DDoS attacks show anomalies in the characteristics of the selected packet attributes. The detection accuracy and performance are analyzed using live traffic traces from a variety of network environments ranging from points in the core of the Internet to those inside an edge network The results indicate that these methods can be effective against current attacks and suggest directions for improving detection of more stealthy attacks. We also describe our detection-response prototype and how the detectors can be extended to make effective response decisions.
引用
收藏
页码:303 / 314
页数:12
相关论文
共 15 条
  • [1] [Anonymous], 1999, STACHELDRAHT DISTRIB
  • [2] Faloutsos M, 1999, COMP COMM R, V29, P251, DOI 10.1145/316194.316229
  • [3] Hubert B., Linux advanced routing and traffic control HOWTO
  • [4] Knuth D. E., ART COMPUTER PROGRAM, V2
  • [5] MAHONEY MV, 2002, SIGKDD 02 EDM ALB CA, P376
  • [6] Moore D, 2001, USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, P9
  • [7] MOUW E, LINUX KERNEL PROCFS
  • [8] POMERANTZ O, LINUX KERNAL MODULE
  • [9] Porras P.A, 1997, P 20 NAT INF SYST SE, V3, P353
  • [10] Roesch M, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE THIRTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIII), P229