Akinori Takahashi, R. Igarashi, K. Sasai, Hiroshi Ueda, Y. Iwaya, Tetsuo Kinoshita, M. Hashimoto
{"title":"低速率DoS攻击的图像R/S痘图表征","authors":"Akinori Takahashi, R. Igarashi, K. Sasai, Hiroshi Ueda, Y. Iwaya, Tetsuo Kinoshita, M. Hashimoto","doi":"10.5188/ijsmer.23.152","DOIUrl":null,"url":null,"abstract":"According to the development of network and systems environment, there are growing concerns about various threats on networking. Since many of those threats are caused by unauthorized access from the network, early detection of them is important as security measures. DoS attacks such as TCP SYN Flood [1] attack and smurf attack [2] waste network resources by sending a large number of packets to the victim and stop the victim's network service. The Flooding attack is relatively easy to detect since it has a characteristic of high rate with respect to the network band. In recent years, however, it has been pointed out that DoS attacks that use attack packets exposed to inadequate detection comparing to conventional methods existed [3]. A lowrate denial of service (LDoS) attack can degrade the quality of TCP communication with fewer attack traffic. LDoS attacks are those that exploit TCP retransmission time out (RTO) which is one of the network congestion control agent of TCP communication. An attack that transmits bursty traffi c with the same time interval of the minimum value of RTO causes instantaneous network congestion and packet losses. When a packet loss occurs, TCP communication performs congestion control, resulting in deterioration in quality such as throughput reduction. It has been proved diffi cult to detect them with the method developed for traditional DDoS attacks, since the attack is hard to distinguish from normal congestions [3,4]. LDoS attacks have a periodicity because bursty traffic transmitted at 1 second interval provides victims a great effect. Various methods have been proposed for detecting attacks by focusing on the periodicity. In Ref. [5], a method is proposed to apply an autocorrelation function to a periodic pulse sequence which includes attack traffic. In Ref. [6], a method is proposed to discriminate patterns of attack traffic from flow level traffic. Detection method by signal processing using the DSP technique has been proposed, and there are methods based on wavelet analysis [7,8] and methods based on multifractal characteristics of network traffi c [9]. In addition, a chaos-based approach [10] is proposed to detect LDoS attack by using the technology of weak signal detection. We have proposed a detection method using R/S pox legline characteristics [11] against long-term port scanning attacks with periodic features like LDoS attacks. The R/S pox leg-line characteristic is a feature value obtained from a graph called an R/S Pox Diagram which is used for estimating self-similarity of a time series. This feature value has superiority over the conventional method because it can quantify change of attack state such as attack-start and attack-end in addition to periodic component detection. The leg-line characteristic is quantifi ed from the slope of the characteristic plots which appears in the R/S Pox Diagram. Since the shape of the plot, from the viewpoint of a twodimensional image, is considered to have various image properties, it is thought to be useful to quantify other shape features of R/S pox leg-line characteristics. The purpose of this study is to propose a method to quantify the features of the plot shape of R/S Pox Diagrams and to evaluate Characterization of the Imaged R/S Pox Diagram for Low-rate DoS Attack","PeriodicalId":14339,"journal":{"name":"International journal of the Society of Materials Engineering for Resources","volume":"116 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Characterization of the Imaged R/S Pox Diagram for Low-rate DoS Attack\",\"authors\":\"Akinori Takahashi, R. Igarashi, K. Sasai, Hiroshi Ueda, Y. Iwaya, Tetsuo Kinoshita, M. Hashimoto\",\"doi\":\"10.5188/ijsmer.23.152\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"According to the development of network and systems environment, there are growing concerns about various threats on networking. Since many of those threats are caused by unauthorized access from the network, early detection of them is important as security measures. DoS attacks such as TCP SYN Flood [1] attack and smurf attack [2] waste network resources by sending a large number of packets to the victim and stop the victim's network service. The Flooding attack is relatively easy to detect since it has a characteristic of high rate with respect to the network band. In recent years, however, it has been pointed out that DoS attacks that use attack packets exposed to inadequate detection comparing to conventional methods existed [3]. A lowrate denial of service (LDoS) attack can degrade the quality of TCP communication with fewer attack traffic. LDoS attacks are those that exploit TCP retransmission time out (RTO) which is one of the network congestion control agent of TCP communication. An attack that transmits bursty traffi c with the same time interval of the minimum value of RTO causes instantaneous network congestion and packet losses. When a packet loss occurs, TCP communication performs congestion control, resulting in deterioration in quality such as throughput reduction. It has been proved diffi cult to detect them with the method developed for traditional DDoS attacks, since the attack is hard to distinguish from normal congestions [3,4]. LDoS attacks have a periodicity because bursty traffic transmitted at 1 second interval provides victims a great effect. Various methods have been proposed for detecting attacks by focusing on the periodicity. In Ref. [5], a method is proposed to apply an autocorrelation function to a periodic pulse sequence which includes attack traffic. In Ref. [6], a method is proposed to discriminate patterns of attack traffic from flow level traffic. Detection method by signal processing using the DSP technique has been proposed, and there are methods based on wavelet analysis [7,8] and methods based on multifractal characteristics of network traffi c [9]. In addition, a chaos-based approach [10] is proposed to detect LDoS attack by using the technology of weak signal detection. We have proposed a detection method using R/S pox legline characteristics [11] against long-term port scanning attacks with periodic features like LDoS attacks. The R/S pox leg-line characteristic is a feature value obtained from a graph called an R/S Pox Diagram which is used for estimating self-similarity of a time series. This feature value has superiority over the conventional method because it can quantify change of attack state such as attack-start and attack-end in addition to periodic component detection. The leg-line characteristic is quantifi ed from the slope of the characteristic plots which appears in the R/S Pox Diagram. Since the shape of the plot, from the viewpoint of a twodimensional image, is considered to have various image properties, it is thought to be useful to quantify other shape features of R/S pox leg-line characteristics. The purpose of this study is to propose a method to quantify the features of the plot shape of R/S Pox Diagrams and to evaluate Characterization of the Imaged R/S Pox Diagram for Low-rate DoS Attack\",\"PeriodicalId\":14339,\"journal\":{\"name\":\"International journal of the Society of Materials Engineering for Resources\",\"volume\":\"116 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International journal of the Society of Materials Engineering for Resources\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5188/ijsmer.23.152\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of the Society of Materials Engineering for Resources","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5188/ijsmer.23.152","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
随着网络和系统环境的发展,各种网络威胁日益受到人们的关注。由于这些威胁中的许多都是由来自网络的未经授权的访问引起的,因此作为安全措施,及早发现它们非常重要。TCP SYN Flood[1]、smurf攻击[2]等DoS攻击会向受害者发送大量报文,造成网络资源的浪费,导致受害者的网络服务中断。由于洪水攻击在网络频带中具有较高的攻击率,因此相对容易被检测到。然而,近年来有人指出,与传统方法相比,使用暴露于不足检测的攻击数据包的DoS攻击存在[3]。低速率的拒绝服务攻击可以在较少的攻击流量下降低TCP通信的质量。TCP重传超时(TCP retransmission timeout, RTO)是TCP通信的网络拥塞控制代理之一。如果攻击以与RTO最小值相同的时间间隔传输突发流量,则会导致网络瞬间拥塞和丢包。当出现丢包时,TCP通信会进行拥塞控制,从而导致吞吐量降低等质量下降。事实证明,传统的DDoS攻击方法很难检测到它们,因为这种攻击很难与正常的拥塞区分开来[3,4]。ddos攻击具有周期性,每隔1秒传输一次的突发流量对受害者的影响很大。已经提出了各种方法来检测攻击,重点关注周期性。在文献[5]中,提出了一种对包含攻击流量的周期脉冲序列应用自相关函数的方法。在文献[6]中,提出了一种区分攻击流量和流级流量模式的方法。提出了利用DSP技术进行信号处理的检测方法,有基于小波分析的方法[7,8]和基于网络流量多重分形特征的方法[9]。此外,还提出了一种基于混沌的方法[10],利用弱信号检测技术检测LDoS攻击。我们提出了一种利用R/S痘腿线特征[11]检测具有周期性特征的长期端口扫描攻击的方法,如ddos攻击。R/S痘腿线特征是从一个称为R/S痘图的图中获得的特征值,用于估计时间序列的自相似性。该特征值除了可以对周期性成分进行检测外,还可以量化攻击开始、攻击结束等攻击状态的变化,具有传统方法无法比拟的优越性。从R/S痘图中出现的特征图的斜率来量化腿线特征。由于从二维图像的角度来看,图的形状被认为具有各种图像属性,因此认为量化R/S痘腿线特征的其他形状特征是有用的。本研究的目的是提出一种方法来量化R/S痘图的图形特征,并评估成像R/S痘图用于低速率DoS攻击的表征
Characterization of the Imaged R/S Pox Diagram for Low-rate DoS Attack
According to the development of network and systems environment, there are growing concerns about various threats on networking. Since many of those threats are caused by unauthorized access from the network, early detection of them is important as security measures. DoS attacks such as TCP SYN Flood [1] attack and smurf attack [2] waste network resources by sending a large number of packets to the victim and stop the victim's network service. The Flooding attack is relatively easy to detect since it has a characteristic of high rate with respect to the network band. In recent years, however, it has been pointed out that DoS attacks that use attack packets exposed to inadequate detection comparing to conventional methods existed [3]. A lowrate denial of service (LDoS) attack can degrade the quality of TCP communication with fewer attack traffic. LDoS attacks are those that exploit TCP retransmission time out (RTO) which is one of the network congestion control agent of TCP communication. An attack that transmits bursty traffi c with the same time interval of the minimum value of RTO causes instantaneous network congestion and packet losses. When a packet loss occurs, TCP communication performs congestion control, resulting in deterioration in quality such as throughput reduction. It has been proved diffi cult to detect them with the method developed for traditional DDoS attacks, since the attack is hard to distinguish from normal congestions [3,4]. LDoS attacks have a periodicity because bursty traffic transmitted at 1 second interval provides victims a great effect. Various methods have been proposed for detecting attacks by focusing on the periodicity. In Ref. [5], a method is proposed to apply an autocorrelation function to a periodic pulse sequence which includes attack traffic. In Ref. [6], a method is proposed to discriminate patterns of attack traffic from flow level traffic. Detection method by signal processing using the DSP technique has been proposed, and there are methods based on wavelet analysis [7,8] and methods based on multifractal characteristics of network traffi c [9]. In addition, a chaos-based approach [10] is proposed to detect LDoS attack by using the technology of weak signal detection. We have proposed a detection method using R/S pox legline characteristics [11] against long-term port scanning attacks with periodic features like LDoS attacks. The R/S pox leg-line characteristic is a feature value obtained from a graph called an R/S Pox Diagram which is used for estimating self-similarity of a time series. This feature value has superiority over the conventional method because it can quantify change of attack state such as attack-start and attack-end in addition to periodic component detection. The leg-line characteristic is quantifi ed from the slope of the characteristic plots which appears in the R/S Pox Diagram. Since the shape of the plot, from the viewpoint of a twodimensional image, is considered to have various image properties, it is thought to be useful to quantify other shape features of R/S pox leg-line characteristics. The purpose of this study is to propose a method to quantify the features of the plot shape of R/S Pox Diagrams and to evaluate Characterization of the Imaged R/S Pox Diagram for Low-rate DoS Attack