An Application of HVG Method to Studying Variations of LDoS Flow Packet Sequence Pattern

Article Preview

Abstract:

By mapping one dimension time series into two dimension graph, Horizontal Visibility Graph (short as HVG) method provides a new way to analyze time series structural properties, it has been used in economics, biology, sociology and other areas related. In this paper, we apply it to investigate the Low-rate Denial-of-Service (LDoS) flow packet sequence pattern variations. We establish the Packet Sequence Model and put new metrics to measure the pattern similarity. Using the data carried out on PlanetLab, we find out that the packet sequence time series of the receiver has a bigger HVG degree than the sender, indicating that the packet sequence patterns get more irregular under the impacts of end-to-end delay.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 791-793)

Pages:

1347-1351

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Luque B, Lacasa L, Ballesteros F, et al. Horizontal visibility graphs: Exact results for random time series[J]. Physical Review E, 2009, 80(4): 046103.

DOI: 10.1103/physreve.80.046103

Google Scholar

[2] Lacasa L, Luque B, Luque J, et al. The visibility graph: A new method for estimating the Hurst exponent of fractional Brownian motion[J]. EPL (Europhysics Letters), 2009, 86(3): 30001.

DOI: 10.1209/0295-5075/86/30001

Google Scholar

[3] Zhou Ting-Ting Jin Ning-De, Gao Zhong-Ke, Luo Yue-Bin. Limited penetrable visibility graph for establishing complex network from time series. Acta Phys. Sin. Vol. 61, No. 3 (2012) : 030506.

DOI: 10.7498/aps.61.030506

Google Scholar

[4] Kuzmanovic A, Knightly E W: Low-rate TCP-targeted denial of Service Attacks. Proceedings of ACM SIGOMM 2003, Karlsruhe, Germany, 2003: 75 – 86.

DOI: 10.1109/tnet.2006.880180

Google Scholar

[5] Sun H, Lui J C S, Yau D K Y. Defending against low-rate TCP attacks: Dynamic detection and protection[C]/Network Protocols, 2004. ICNP 2004. Proceedings of the 12th IEEE International Conference on. IEEE, 2004: 196-205.

DOI: 10.1109/icnp.2004.1348110

Google Scholar

[6] Chen Y, Hwang K. Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Journal of Parallel and Distributed Computing, 2006, 66(9): 1137-1151.

DOI: 10.1016/j.jpdc.2006.04.007

Google Scholar

[7] Luo X, Chang R K C. On a new class of pulsing denial-of-service attacks and the defense[C]/Proceedings of the ISOC Symposium on Network and Distributed Systems Security (SNDSS). 2005: 61-79.

Google Scholar

[8] Zhang C, Yin J, Cai Z, et al. RRED: robust RED algorithm to counter low-rate denial-of-service attacks[J]. Communications Letters, IEEE, 2010, 14(5): 489-491.

DOI: 10.1109/lcomm.2010.05.091407

Google Scholar

[9] Lin Wang, Wei Peng, Zhijian Huang, Yongjun Wang. An Analysis of Impact of End-to-end Delay on LDoS Flows in the Internet. IMCCC 2012, Haerbin, China.

DOI: 10.1109/imccc.2012.260

Google Scholar

[10] Information on http: /www. planet-lab. org.

Google Scholar