Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, K. Sakurai
{"title":"A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation","authors":"Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, K. Sakurai","doi":"10.1109/AsiaJCIS.2016.24","DOIUrl":null,"url":null,"abstract":"DRDoS (Distributed Reflection Denial of Service) attack is a kind of DoS (Denial of Service) attack, in which third-party servers are tricked into sending large amounts of data to the victims. That is, attackers use source address IP spoofing to hide their identity and cause third-parties to send data to the victims as identified by the source address field of the IP packet. This is called reflection because the servers of benign services are tricked into \"reflecting\" attack traffic to the victims. The most typical existing detection methods of such attacks are designed based on known attacks by protocol and are difficult to detect the unknown ones. According to our investigations, one protocol-independent detection method has been existing, which is based on the assumption that a strong linear relationship exists among the abnormal flows from the reflector to the victim. Moreover, the method is assumed that the all packets from reflectors are attack packets when attacked, which is clearly not reasonable. In this study, we found five features are effective for detecting DRDoS attacks, and we proposed a method to detect DRDoS attacks using these features and machine learning algorithms. Its detection performance is experimentally examined and the experimental result indicates that our proposal is of clearly better detection performance.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS.2016.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17
Abstract
DRDoS (Distributed Reflection Denial of Service) attack is a kind of DoS (Denial of Service) attack, in which third-party servers are tricked into sending large amounts of data to the victims. That is, attackers use source address IP spoofing to hide their identity and cause third-parties to send data to the victims as identified by the source address field of the IP packet. This is called reflection because the servers of benign services are tricked into "reflecting" attack traffic to the victims. The most typical existing detection methods of such attacks are designed based on known attacks by protocol and are difficult to detect the unknown ones. According to our investigations, one protocol-independent detection method has been existing, which is based on the assumption that a strong linear relationship exists among the abnormal flows from the reflector to the victim. Moreover, the method is assumed that the all packets from reflectors are attack packets when attacked, which is clearly not reasonable. In this study, we found five features are effective for detecting DRDoS attacks, and we proposed a method to detect DRDoS attacks using these features and machine learning algorithms. Its detection performance is experimentally examined and the experimental result indicates that our proposal is of clearly better detection performance.
DRDoS (Distributed Reflection Denial of Service)攻击是一种DoS (Denial of Service)攻击,通过欺骗第三方服务器向受害者发送大量数据。即攻击者通过源地址IP欺骗来隐藏自己的身份,使第三方根据IP报文的源地址字段来识别攻击者的数据。这被称为反射,因为良性服务的服务器被欺骗,将攻击流量“反射”给受害者。现有最典型的此类攻击检测方法是基于已知的协议攻击设计的,难以检测到未知的攻击。根据我们的研究,一种与协议无关的检测方法已经存在,该方法基于反射器到受害者的异常流之间存在强线性关系的假设。而且,该方法在攻击时假定反射器的所有报文都是攻击报文,这显然是不合理的。在本研究中,我们发现了检测DRDoS攻击有效的五个特征,并提出了一种利用这些特征和机器学习算法检测DRDoS攻击的方法。对其检测性能进行了实验检验,实验结果表明我们的方案具有明显更好的检测性能。