{"title":"F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management","authors":"Mahsa Nooribakhsh, M. Mollamotalebi","doi":"10.22042/ISECURE.2020.167450.453","DOIUrl":null,"url":null,"abstract":"Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the proposed method attempts to detect it, is the most common type of DDoS attacks. The aim of this paper is to reduce the delay of real-time detection of DDoS attacks utilizing hybrid structures based on data stream algorithms. The proposed data structure (BHM ) improves the data storing mechanism presented in STONE method and consequently reduces the detection time. STONE characterizes regular network traffic of a service by aggregating it into common prefixes of IP addresses, and detecting attacks when the aggregated traffic deviates from the regular one. In BHM, history refers to the output traffic information obtained from each monitoring period to form a reference profile. The reference profile is created by employing historical information and only includes normal traffic information. The delay of DDoS attack detection increases in STONE due to long-time intervals between each monitoring period. The proposed method (F-STONE) has been compared to STONE based on attack detection time, Expected Profile Update Time (EPUT), and rate of attack detection. The evaluation results indicated significant improvements in terms of the EPUT, acceleration of attack detection and reduction of false positive rate.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISC Int. J. Inf. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22042/ISECURE.2020.167450.453","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the proposed method attempts to detect it, is the most common type of DDoS attacks. The aim of this paper is to reduce the delay of real-time detection of DDoS attacks utilizing hybrid structures based on data stream algorithms. The proposed data structure (BHM ) improves the data storing mechanism presented in STONE method and consequently reduces the detection time. STONE characterizes regular network traffic of a service by aggregating it into common prefixes of IP addresses, and detecting attacks when the aggregated traffic deviates from the regular one. In BHM, history refers to the output traffic information obtained from each monitoring period to form a reference profile. The reference profile is created by employing historical information and only includes normal traffic information. The delay of DDoS attack detection increases in STONE due to long-time intervals between each monitoring period. The proposed method (F-STONE) has been compared to STONE based on attack detection time, Expected Profile Update Time (EPUT), and rate of attack detection. The evaluation results indicated significant improvements in terms of the EPUT, acceleration of attack detection and reduction of false positive rate.
分布式拒绝服务攻击(Distributed Denial of Service, DDoS)是近年来常见的一种攻击方式,它通过大量发送报文来耗尽受害节点的带宽。根据攻击的流量类型、流量大小以及被攻击对象利用的漏洞,DDoS攻击可以分为容量攻击、协议攻击和应用攻击三种类型。容量攻击是最常见的DDoS攻击类型,本文提出的方法试图检测容量攻击。本文的目的是利用基于数据流算法的混合结构来减少DDoS攻击实时检测的延迟。所提出的数据结构(BHM)改进了STONE方法的数据存储机制,从而缩短了检测时间。STONE通过将业务的正常网络流量聚合成共同的IP地址前缀,并在聚合后的流量偏离正常时检测攻击行为,从而将业务的正常网络流量特征化。在BHM中,历史是指从每个监控周期中获得的输出流量信息,以形成参考配置文件。引用配置文件是利用历史信息创建的,只包含正常的流量信息。在STONE中,由于每个监控周期间隔较长,DDoS攻击检测的延迟会增加。基于攻击检测时间、预期配置文件更新时间(EPUT)和攻击检测率,将本文提出的方法(F-STONE)与STONE进行比较。评价结果表明,该方法在EPUT、攻击检测加速和误报率降低等方面均有显著提高。