{"title":"Lightweight Detection of DoS Attacks","authors":"S. Pukkawanna, V. Visoottiviseth, P. Pongpaibool","doi":"10.1109/ICON.2007.4444065","DOIUrl":null,"url":null,"abstract":"Denial of service (DoS) attacks have continued to evolve and impact availability of the Internet infrastructure. Many researchers in the field of network security and system survivability have been developing mechanisms to detect DoS attacks. By doing so they hope to maximize accurate detections (true-positive) and minimize non-justified detections (false-positive). This research proposes a lightweight method to identify DoS attacks by analyzing host behaviors. Our method is based on the concept of BLINd Classification or BLINC: no access to packet payload, no knowledge of port numbers, and no additional information other than what current flow collectors provide. Rather than using pre-defined signatures or rules as in typical Intrusion Detection Systems, BLINC maps flows into graphlets of each attack pattern. In this work we create three types of graphlets for the following DoS attack patterns: SYN flood, ICMP flood, and host scan. Results show that our method can identify all occurrences and all hosts associated with attack activities, with a low percentage of false positive.","PeriodicalId":131548,"journal":{"name":"2007 15th IEEE International Conference on Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 15th IEEE International Conference on Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICON.2007.4444065","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 24
Abstract
Denial of service (DoS) attacks have continued to evolve and impact availability of the Internet infrastructure. Many researchers in the field of network security and system survivability have been developing mechanisms to detect DoS attacks. By doing so they hope to maximize accurate detections (true-positive) and minimize non-justified detections (false-positive). This research proposes a lightweight method to identify DoS attacks by analyzing host behaviors. Our method is based on the concept of BLINd Classification or BLINC: no access to packet payload, no knowledge of port numbers, and no additional information other than what current flow collectors provide. Rather than using pre-defined signatures or rules as in typical Intrusion Detection Systems, BLINC maps flows into graphlets of each attack pattern. In this work we create three types of graphlets for the following DoS attack patterns: SYN flood, ICMP flood, and host scan. Results show that our method can identify all occurrences and all hosts associated with attack activities, with a low percentage of false positive.
拒绝服务(DoS)攻击不断发展并影响着Internet基础设施的可用性。许多网络安全和系统生存性领域的研究人员一直在开发检测DoS攻击的机制。通过这样做,他们希望最大化准确的检测(真阳性)和最小化不合理的检测(假阳性)。本研究提出了一种通过分析主机行为来识别DoS攻击的轻量级方法。我们的方法基于盲分类或BLINC的概念:不访问数据包有效负载,不知道端口号,除了电流收集器提供的信息之外,没有其他信息。不像典型的入侵检测系统那样使用预定义的签名或规则,BLINC将流映射到每个攻击模式的小块中。在这项工作中,我们为以下DoS攻击模式创建了三种类型的graphlet: SYN flood, ICMP flood和主机扫描。结果表明,该方法可以识别所有事件和与攻击活动相关的所有主机,误报率低。