P. Mohana Priya, V. Akilandeswari, S. Shalinie, V. Lavanya, M. Shanmuga Priya
{"title":"The Protocol Independent Detection and Classification (PIDC) system for DRDoS attack","authors":"P. Mohana Priya, V. Akilandeswari, S. Shalinie, V. Lavanya, M. Shanmuga Priya","doi":"10.1109/ICRTIT.2014.6996154","DOIUrl":null,"url":null,"abstract":"High-rate flooding attack detection and classification has become a necessary component for network administrators due to their attack range that affects the Data Center servers. The main objective of this paper is to propose the Protocol Independent Detection and Classification (PIDC) system in order to prevent the web servers from devastating attacks such as Distributed Reflection Denial of Service (DRDoS) attacks. The DRDoS flooding attack exploits fixed IP spoofing to defeat the Distributed Denial of Service (DDoS) attack prevention measures. This is the first paper to detect and classify the types of reflected attacks using SNMP MIB variables. The proposed PIDC system uses the data mining and machine learning techniques to detect all types of reflected flooding attacks. The rank correlation based detection algorithm retrieves the incoming traffic in the form of Simple Network Management Protocol -Management Information Base (SNMP-MIB) variables and finds the relationship between the MIB variables to detect the attacks from the normal traffic. Then, C4.5 classification algorithm extracts and frames association rule based on protocol information from reflected DDoS flooding attacks. Finally, the CPU, memory and disk resource distribution to legitimate requests are also increased. This method achieves 99% of true positive rates and less false positive rate of (1%) when compared to existing reflected attack detection methods. Moreover, these attacks are classified by types such as TCP reflection attacks and DNS reflection attacks with the highest probability of attack traffic.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Recent Trends in Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTIT.2014.6996154","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
High-rate flooding attack detection and classification has become a necessary component for network administrators due to their attack range that affects the Data Center servers. The main objective of this paper is to propose the Protocol Independent Detection and Classification (PIDC) system in order to prevent the web servers from devastating attacks such as Distributed Reflection Denial of Service (DRDoS) attacks. The DRDoS flooding attack exploits fixed IP spoofing to defeat the Distributed Denial of Service (DDoS) attack prevention measures. This is the first paper to detect and classify the types of reflected attacks using SNMP MIB variables. The proposed PIDC system uses the data mining and machine learning techniques to detect all types of reflected flooding attacks. The rank correlation based detection algorithm retrieves the incoming traffic in the form of Simple Network Management Protocol -Management Information Base (SNMP-MIB) variables and finds the relationship between the MIB variables to detect the attacks from the normal traffic. Then, C4.5 classification algorithm extracts and frames association rule based on protocol information from reflected DDoS flooding attacks. Finally, the CPU, memory and disk resource distribution to legitimate requests are also increased. This method achieves 99% of true positive rates and less false positive rate of (1%) when compared to existing reflected attack detection methods. Moreover, these attacks are classified by types such as TCP reflection attacks and DNS reflection attacks with the highest probability of attack traffic.