Traffic Classification Features and its Application in DDoS Detection

Article Preview

Abstract:

DDoS attacks have relatively low proportion of normal flow in the boundary network at the attack traffic,In this paper,we establish DDoS attack detection method based on defense stage and defensive position, and design and implement collaborative detection of DDoS attacks. Simulation results show that our approach has good timeliness, accuracy and scalability than the single-point detection and route-based distributed detection scheme.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2673-2676

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Li Jun, Comprehensive Analytical of DDoS attack. Network security technology and application, , 8-10, September 2007. 9(Chinese).

Google Scholar

[2] Li Yanheng, Research on DDoS Detection Technology,. National University of Defense Technology. 2006. (Chinese).

Google Scholar

[3] Yu Chen, Kai Hwang, Wei-Shinn Ku, Collaborative Detection of DDoS Attacks over Multiple Network Domains,  IEEE Trans. Parallel Distrib. Syst. Vol. 18, 2007, 1649-1662.

DOI: 10.1109/tpds.2007.1111

Google Scholar

[4] Debra L Cook, William G Morein, Angelos D Keromysis, etc, Websos Protecting web servers from ddos attacks, , Proceeding of the 11th IEEE Internationaleon Conference on Networks(ICON), USA, Columbia University, (2003).

DOI: 10.1109/icon.2003.1266234

Google Scholar

[5] Krishnamurthy B, Sen S, Zhang Y, Chen Y, Sketch—Based change detection: Methods, evaluation, and applications, Proc, of the ACM SIGCOMM Internet Measurement Conf. New York: ACM Press, 2003, 234-247.

DOI: 10.1145/948205.948236

Google Scholar

[6] Schweller R, Li ZC, Chen Y, GaoY, Gupta A, Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications. " Proc. Of the 25th IEEE Int, l Conf. on Computer Communications. New York: IEEE, 2006. 1397-1408.

DOI: 10.1109/infocom.2006.203

Google Scholar