2013
DOI: 10.14257/ijsia.2013.7.5.07
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Multi Scale Approach for Detecting High Bandwidth Aggregates in Network Traffic

Abstract: Today the scale, complexity and intensity of Denial of Service attacks has increased many folds. These attacks have moved from simple flooding based attacks to sophisticated Application based attacks as well as Protocol specific attacks.The challenge is to develop detection algorithms that can distinguish between the attacks like the new pulsating denial of service and legitimate traffic like Flash events. The presence of self-similarity in computer network traffic has introduced a newer dimension in technique… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…Mahajan et al introduced in [40] due to a congestion in some network links, some legitimate traffic could be dropped resulting in a degrading performance of the network, figure 12 shows a clear case of this situation. Since link L0 is congested due to DDoS attack, so good traffic coming from link L1 may be dropped before reaching its destination's D. So, if the attack traffic could be filtered one level up, i.e.…”
Section: Pushback Technique Applicabilitymentioning
confidence: 99%
“…Mahajan et al introduced in [40] due to a congestion in some network links, some legitimate traffic could be dropped resulting in a degrading performance of the network, figure 12 shows a clear case of this situation. Since link L0 is congested due to DDoS attack, so good traffic coming from link L1 may be dropped before reaching its destination's D. So, if the attack traffic could be filtered one level up, i.e.…”
Section: Pushback Technique Applicabilitymentioning
confidence: 99%
“…Similarly, the detection of anomalies, particularly DDoS attacks, presented in Nurohman et al 25 is done through the use of Kolmogorov-Smirnov test and H parameter estimation, which can distinguish abnormalities among the traffic by testing the self-similarity condition. A slightly different perspective was wavelets-based analysis presented in Kaur et al 26 The test of selfsimilarity is conducted to differentiate between legitimate flash events and expanding DDoS attacks. In the same manner, another wavelet-based method for detecting outliers, such as DDoS attacks, in regards to LRD behavior of network traffic is presented in Zhang et al 27 In Jian-Qi et al, 28 the composition self-similarity anomaly detection (CSSD) of network traffic is presented for the detection of DoS attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Similarly, in [7], comparable observations are presented based on the analysis of the impact of DoS attacks on traffic spectral density. Conversely, in [20] a wavelet-based estimation of LRD is used to differentiate between flash crowds and pulsating distributed denial of service attacks. It is also presented in [20] that DDoS attacks and their detection are short-range phenomena; therefore, they change the LRD nature of the traffic.…”
Section: Introductionmentioning
confidence: 99%
“…Conversely, in [20] a wavelet-based estimation of LRD is used to differentiate between flash crowds and pulsating distributed denial of service attacks. It is also presented in [20] that DDoS attacks and their detection are short-range phenomena; therefore, they change the LRD nature of the traffic. Furthermore, for early detection of network abnormalities caused by DDoS attack, Liu et al [21] use the autocorrelation and LRD parameter measurements.…”
Section: Introductionmentioning
confidence: 99%