Lightweight detection of DoS attacks

Denial of Service (DoS) attacks have continued to evolve and impact availability of the Internet infrastructure. Many researchers in the field of network security and system survivability have been developing mechanisms to detect DoS attacks. By doing so they hope to maximize accurate detections (tr...

全面介紹

Saved in:
書目詳細資料
Main Authors: Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita Pongpaibool
其他作者: Mahidol University
格式: Conference or Workshop Item
出版: 2018
主題:
在線閱讀:https://repository.li.mahidol.ac.th/handle/123456789/24386
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Mahidol University
實物特徵
總結:Denial of Service (DoS) attacks have continued to evolve and impact availability of the Internet infrastructure. Many researchers in the field of network security and system survivability have been developing mechanisms to detect DoS attacks. By doing so they hope to maximize accurate detections (true-positive) and minimize non-justified detections (false-positive). This research proposes a lightweight method to identify DoS attacks by analyzing host behaviors. Our method is based on the concept of BLINd Classification or BLINC: no access to packet payload, no knowledge of port numbers, and no additional information other than what current flow collectors provide. Rather than using pre-defined signatures or rules as in typical Intrusion Detection Systems, BLINC maps flows into graphlets of each attack pattern. In this work we create three types of graphlets for the following DoS attack patterns: SYN flood, ICMP flood, and host scan. Results show that our method can identify all occurrences and all hosts associated with attack activities, with a low percentage of false positive. © 2007 IEEE.