Characterization of Network-Wide Anomalies in Traffic Flows
|
|
|
- Shon Cunningham
- 9 years ago
- Views:
Transcription
1 Characterization of Network-Wide Anomalies in Traffic Flows Anukool Lakhina Dept. of Computer Science, Boston University Mark Crovella Dept. of Computer Science, Boston University Christophe Diot Intel Research Cambridge, UK ABSTRACT Detecting and understanding anomalies in IP networks is an open and ill-defined problem. Toward this end, we have recently proposed the subspace method for anomaly diagnosis. In this paper we present the first large-scale exploration of the power of the subspace method when applied to flow traffic. An important aspect of this approach is that it fuses information from flow measurements taken throughout a network. We apply the subspace method to three different types of sampled flow traffic in a large academic network: multivariate timeseries of byte counts, packet counts, and IP-flow counts. We show that each traffic type brings into focus a different set of anomalies via the subspace method. We illustrate and classify the set of anomalies detected. We find that almost all of the anomalies detected represent events of interest to network operators. Furthermore, the anomalies span a remarkably wide spectrum of event types, including denial of service attacks (single-source and distributed), flash crowds, port scanning, downstream traffic engineering, high-rate flows, worm propagation, and network outage. Categories and Subject Descriptors C..3 [Computer-Communication Networks]: Network Operations General Terms Measurement, Performance, Security Keywords Anomaly Detection, Network Traffic Analysis This work was supported in part by NSF grants ANI and CCR This work was performed while M. Crovella was at Laboratoire d Informatique de Paris 6 (LIP6), with support from Centre National de la Recherche Scientifique (CNRS) France and Sprint Labs. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. IMC 0, October 5 7, 00, Taormina, Sicily, Italy. Copyright 00 ACM /0/00...$ INTRODUCTION A general method for detecting anomalies in network traffic is an important, unsolved problem. In principal, it should be possible to observe most anomaly types by inspecting traffic flows. However, to date, there has been little progress on extracting the range of information present in the complete set of traffic flows in a network. There are many good reasons for this: traffic flows present many possible types of network traffic; the set of all flows occupies a very high-dimensional space; and collecting all traffic flows is very resource-intensive. Nonetheless, the increasingly widespread use of tools such as NetFlow [] by ISPs make it realistic to contemplate methods for efficiently collecting and effectively analyzing traffic flows. We make three contributions in this paper. First, we show that when traffic flows are aggregated at the Origin-Destination (OD) level, they can provide a wealth of insight into network-wide anomalies. This suggests a strategy for data reduction that can make flow collection for anomaly detection easier. Second, we apply the subspace method [16] to multivariate timeseries of OD flow traffic defined as # bytes, # packets, and # of IP-level flows. We show that each of these traffic types reveals a different (sometimes overlapping) class of anomalies and so all three types together are important for anomaly detection. Finally, we analyze the anomalous events detected in these high-dimensional timeseries. We show that nearly all the anomalies detected by the subspace method are of interest to network operators. The range of anomalies detected is remarkably broad. For example, by analyzing four weeks of flow traffic from the Abilene network, we have been able to identify occurrences of flash crowds, changes in routing policy, worms, Denial of Service attacks, and massive data transfers. We describe the anomalies found and show the features that they tend to exhibit. This paper represents a first step toward a broadly applicable system for anomaly diagnosis in networks, one which provides detection (stating that an anomaly is present) and identification (stating the type of the anomaly). The paper illustrates the power of the subspace method for detection when applied to traffic flow data. The paper does not propose an anomaly identification method (all our anomalies were identified through manual inspection) but we believe that, given accurate detection, automated methods for anomaly identification will follow. This paper builds in part on investigations begun by papers [17] and [16]. In [17] we showed basic characteristics of the byte counts in OD flows, without examining packet or flow counts, and without concentrating on anomalies per se. In [16] we introduced the subspace method, but applied it to a different problem (link data). The current paper represents the next step, and goes well beyond the previous two. It shows that OD flow data is a very rich source of information (much richer than the link data examined in [16]).
2 Furthermore, this paper shows that the subspace method can easily extend to a larger and more diverse set of data than [17] and can reveal a surprisingly wide range of anomalies. This paper is organized as follows. In Section, we describe the Abilene flow data we use. A brief review and necessary extensions to the subspace method are also presented in this section. In Section 3, we demonstrate that the subspace method can successfully extract anomalies from traffic timeseries of bytes, packets and IPflows collected on the Abilene backbone network. We characterize and classify these anomalies Section. In Section 5, we discuss related work. Finally, concluding remarks and future work are presented in Section 6.. METHODOLOGY We first introduce the raw traffic data that we collected. Then, we outline the procedure to aggregate this raw data at the level of Origin-Destination flows. We also review the main ideas of the subspace method and show how to extend it to diagnose anomalies in OD flow traffic..1 Network-Wide Traffic Flow Data Our source of data is IP-level traffic flow measurements collected from every point of presence (PoP) in the Abilene Internet backbone network. Abilene is a major academic network, connecting over 00 US universities and peering with research networks in Europe and Asia. Abilene has 11 PoPs and spans the continental US. The academic and experimental nature of the traffic on Abilene makes it an attractive candidate for developing methods to understand anomalies. We processed sampled flow data from every router of Abilene for a period of four weeks, the week of April 7 to 13, 003 and the three weeks from December 8 to 8, 003. Sampling is random, capturing 1% of all packets entering every router. Sampled packets are then aggregated at the 5-tuple IP-flow level (IP address and port number for both source and destination, along with protocol type), every minute using Juniper s Traffic Sampling [13]. The number of bytes and packets in each sampled IP flow are also recorded. This allows us examine three distinct representations of sampled flow traffic, as timeseries of the # of bytes, # of packets and # of IP-flows, all indexed by the 5-tuple headers. Finally, to avoid synchronization issues that could have arisen in the data collection procedure, we aggregated these measurements into 5 minute bins. The traffic exchanged between an origin-destination pair consists of IP-level flows that enter the network at a given ingress PoP and exit at another egress PoP. We aggregated the IP-level traffic into OD flows. An important advantage of this aggregation is that it dramatically reduces the data volume involved. In order to construct OD flows from the raw traffic collected on all network links, we have to identify the ingress and egress PoPs of each flow. The ingress PoP can be identified by inspecting the router configuration files for interfaces connecting Abilene s customers and peers. For egress PoP resolution, we use BGP and ISIS routing tables as detailed in [8]. We augmented the routing tables with configuration files in order to resolve customer IP addresses that do not appear in the BGP tables. For privacy reasons, Abilene anonymizes the last 11 bits of the destination IP address. This is not a significant concern for egress PoP resolution because there are few prefixes less than 11 bits in the Abilene routing tables. In fact, using this procedure, we were able to successfully obtain the ingress and egress PoPs for more than 93% of all IP flows measured (accounting for more than 90% of the total byte traffic). Note that our routing tables are computed once a day and stay unchanged for that day. We believe that this does not significantly impact our results since previous studies have found that the impact of routing events on the traffic inside an AS is limited [, 3]. However, one potential impact is that it becomes more difficult to explain the cause of an anomaly if it is caused by an internal routing change. To summarize: the data on which we apply the subspace method is OD flow traffic timeseries, defined as the # of bytes, # of packets and # of IP-flows, aggregated at 5 minute intervals for a period of weeks. In order to faciliate subsequent discussion of this data, we introduce the relevant notation now. We let X denote the n p OD flow traffic multivariate timeseries where p = 11 is the number of OD pairs and n is the number of 5-minute bins in the time period being studied. Typically we will study periods of one week and so n>p. Thus column i of X corresponds to the timeseries of OD flow i traffic. Note that we will use X to refer to either of the three types of traffic (i.e. # bytes, # packets and # IP-flows) and clarify the actual traffic type wherever needed.. The Subspace Method and Extensions The central ideas behind the subspace method are drawn from the literature on multivariate statistical process control [7, 1]. In [16], we applied the subspace method to detect anomalies in link traffic byte counts. However, anomaly diagnosis using the subspace method is not limited to link traffic alone and can be extended to other multivariate traffic data, such as the three OD flow traffic types. In this section, we briefly review the subspace method and show how to extend it to diagnose anomalies in OD flow traffic. The subspace method works by examining the timeseries of traffic in all OD flows (i.e., X) simultaneously. It then separates this multivariate timerseries into normal and anomalous attributes. Normal traffic behavior is determined directly from the data, as the temporal patterns that are most common to the ensemble of OD flows. This extraction of common trends is achieved by Principal Component Analysis (PCA). As shown in [17], PCA can be used to decompose the set of OD flows into their constituent eigenflows, or common temporal patterns. A useful property of this decomposition is that the set of eigenflows, {u} p i=1, are ordered by the amount of variance they capture in the original data. Thus the first eigenflow, u 1, captures the temporal trend common to all the OD flows, u is the next strongest temporal trend, and so on. A key result of [17] was that only a handful of eigenflows are sufficient to capture the dominant temporal patterns that are common to the hundreds of OD flows. The subspace method exploits this result by designating the trends in these top k eigenflows, {u} k 1, as normal, and the temporal patterns in the remaining eigenflows as anomalous (we use k =throughout). We can then use this separation to reconstruct each OD flow as a sum of normal and anomalous components. In particular, we can write, x = ˆx + x, where x denotes the traffic of all the OD flows at a specific point in time, ˆx is the reconstruction of x using only the top eigenflows and x contains the residual traffic. While the methods in [16] used the squared prediction error ( x ˆx ) to detect the time of an anomaly, we find that for this more diverse set of data, an additional test is also needed. Squared prediction error detects anomalies in the residual vector; we also need to detect anomalies occuring in the normal subspace. For this, we employ the t statistic as used in multivariate process control [11]. This statistic also has an associated threshold for detecting anomaly times, based on a chosen confidence level. Due to space limitations and because it is not central to the message of this paper, we do not provide details of the t statistic applied on traffic data here; a complete discussion can be found in [15].
3 x 15 x 9 x 9 State Vector 8 6 State Vector 8 6 State Vector 3 1 x 15 x 9 x 9 Residual Vector 3 1 [1] Residual Vector 8 6 [3] [] Residual Vector [5] t Vector [] t Vector 15 5 [] t Vector [] /8/03 /9/03 //03 /11/03 /8/03 /9/03 //03 /11/03 /8/03 /9/03 //03 /11/03 (a) # of Bytes (b) # of Packets (c) # of IP-Flows Figure 1: An illustration of the subspace method on the three types of OD flow traffic. Top row: timeseries of state vector squared magnitude ( x ); middle row: timeseries of the residual vector squared magnitude ( x ); bottom row: t vector. 3. APPLYING THE SUBSPACE METHOD In this section, we illustrate how the subspace method detects anomalies in each of the three types of OD flow timeseries. Figure 1 shows examples results for the three different views of OD flow traffic over a common 3.5 day period. The top row of Figure 1 presents timeseries of total traffic ( x ). The middle row shows the timeseries of the residual traffic vector, x, along with the corresponding threshold line. Finally, in the bottom row, we present timeseries of the t metric, along with the statistic threshold. The threshold for both the statistics were computed at the 99.9% confidence level. Figure 1 illustrates a number of properties of whole-network traffic flow data. The top row of the figure shows that the three types of OD flow traffic can differ substantially. This suggests that the three data types present complementary information about the nature of traffic across the network. Furthermore, each of these views is noisy and appears to be nonstationary, showing noticeable diurnal cycles. The lower two rows of the figure show how effective the subspace method is at isolating and highlighting anomalies (values above the threshold represent anomaly detection). The periodicity in the original traffic is largely removed, and anomalies appear as distinct spikes against a background of noise. The power of the method is also seen in the fact that the t metric for bytes and packets extracts some similar features from the data (e.g., the anomaly () occuring on /) despite the fact that the original traffic timeseries (top row) in each case is very different. The figure also shows that the set of anomalies detected in each traffic type (# bytes, # packets, and # IP-flows) is noticeably different. This shows that each traffic type is important for detecting anomalies, a point which we substantiate quantitively in the next section. To illustrate the diverse set of anomalies detected in a common 3.5 day period across the traffic types, we have marked selected anomalies from each type along with their likely explanations. Anomaly labeled (1) is a byte anomaly and corresponds to a bandwidth measurement experiment, () corresponds to a similar bandwidth measurement experiment but appears in both byte and packet traffic types, (3) is packet anomaly corresponding to a DoS attack on port 1 (pop), () appears in packet and IP-flow traffic types and is a DoS attack on port 113 (identd), and (5) is an IP-flow anomaly that appears to be caused by a port scan. In the next section, we describe how we identified these and all of other detected anomalies. Traffic B F P BF BP FP BFP # Found: Table 1: Number of anomalies found in each traffic type.. CHARACTERIZING ANOMALIES Having detected anomalies in each of the three traffic types, we now characterize these anomalies. We seek to understand the type of information that can be extracted from network-wide traffic flows, and the utility of the subspace method in performing the extraction. The subspace method designates a time instant during which traffic is anomalous. Thus the first step in identifying the nature of the anomaly is to pinpoint the set of OD flows involved. We used a straightforward method: since each anomaly results in a value of the x or t that exceeds the threshold statistic, we determine the smallest set of OD flows, which if removed from the corresponding statistic, would bring it under threshold. More sophisticated identification methods are possible if one adopts a hypothesis-testing view (as was used in [16]); however since a goal of our study is to characterize anomalies, by definition we do not have an a priori set of hypothesized anomalies ready for testing. The next step is to aggregate anomalies in space and time. We start with the set of anomalies cast as triples of (traffic type, time, OD flow) where traffic type is one of Bytes (B), Packets (P), or IP-Flows (F). We first aggregate all triples with the same time value, placing some triples into the new categories BP, BF, FP, and BFP. Thus a BP anomaly is one that is detected in both byte and packet timeseries at the same time. Then we group triples to form anomalies in space (all OD flows corresponding to the same traffic type and time) and time (all triples with consecutive time values, having the same traffic type). This results in our final set of anomalies, in which each anomaly has an associated set of OD flows and potentially spans consecutive time bins. The number of such anomalies found in our four weeks of data is shown in Table 1. This table shows a number of interesting features. First of all, each traffic type (B, F, and P) is important for detecting anomalies, allowing detection of anomalies that are not systematically detected in the other types. Secondly, a relatively small set of anomalies are detected in more than one traffic type. Indeed, there are no anomalies that are detected in just the bytes and flows simultaneously.
4 Frequency Frequency Anomaly Duration (in minutes) (a) Anomaly Duration Number of OD pairs in anomaly (b) # of OD Flows responsible Figure : Quantifying the scope of network-wide anomalies by duration and by the number of OD flows involved. Histograms of anomaly duration and size (measured in number of participating OD flows) are shown in Figure. The figure shows that most anomalies are small, both in time and space; however a non-negligible number of anomalies can be quite large. We inspected each of the anomalies identified to determine their root causes. To aid our inspection, we developed a semi-automated procedure that encoded common patterns found in the data, and output a tentative classification for each anomaly. However each classification was checked by hand to ensure its correctness. In classifying anomalies, an important distiguishing tool is the notion of a dominant IP address range and/or port. An address range or port is dominant in a particular OD flow and timebin if it is unusually prevalent. We used a simple threshold test: if the address range or port accounted for more than a fraction p of the total traffic (defined over either of the three types) in the timebin, it was considered dominant. We found that a value of p = 0. worked well. We used this threshold test to determine, for each anomaly, whether any source address range, destination address range, source port, or destination port was dominant. We emphasize that this heuristic is simply one way to identify and classify anomalies, and other heuristics may also work well. After inspecting each anomaly, and taking into account the presence of dominant features in the anomaly, we were able to group all anomalies into the categories shown in Table. About % of the anomalies could not be placed in any category. In addition, about 8% of anomalies after inspection turned out to be false alarms (meaning that visual inspection of traffic timeseries showed no distinctly unusual changes in volume). Most of the entries in Table are fairly easy to distinguish by inspecting the dominant attributes of the raw flows. Alpha flows are high-rate flows from a single source to a single destination which account for a dominant fraction of byte traffic. These can be distinguished from DoS and DDoS attacks, which feature a dominant fraction of packet or flow traffic, all to a single destination. The distinction between flash crowd and DoS anomalies can be difficult. We adopted a heuristic based on the findings of [], which showed that DoS requests came from clients widely distributed across the Internet (perhaps because DoS attacks are more likely to be spoofed). In that light, traffic emerging from topologically clustered hosts and directed to well known destination ports (e.g. port 53 (dns) or 80 (web)) are classified as flash crowd events. However, this heuristic may not always hold and as a result, some of the flash crowds we detect may be DoS attacks in reality. We relied on port information to manually verify a large set of our anomaly classifications. For example, we found that most alpha traffic was exchanged between dominant ports that ranged from (used by bandwidth experiments conducted at []), port (used by pathdiag [0]), and port 11 (used by filesharing applications such as kazaa/morpheus). Most of the DoS anomalies targetted port 0, although we found instances of a large numer of packets targetting a single destination at port 1 (pop) and in another case, port 113 (identd). Moreover, we uncovered instances of flow traffic that used a dominant port 5 in our April data, which perhaps was caused by the March outbreak of the Deloader worm [5]. Other suspicious worm anomalies featured large spikes in flow traffic with the dominant attribute as port 133 (sql server); we conjecture that these could be lingering remnants of the MS SQL-Snake worm, which spread using this port. We also found instances of anomalies with no dominant attribute. Many of these anomalies had sharp dips in traffic volume. By correlating these dips with the Abilene Operations weekly reports [1], we were able to find explanations for most of the traffic dips. One interesting consequence of an outage event that we detected was a surge in traffic that lasted the same duration and occurred elsewhere in the network. Closer inspection revealed that this was an example of a multihomed customer routing traffic around the outage. What is most striking about Table is the extremely wide range of anomaly types detected. They range from unusual end-user behavior (alpha, flash crowds, point/multipoint), to malicious enduser behavior, (either actual DoS, DDoS, worms or potentially malicious scans), to operational events such as equipment outage (outage) and downstream traffic engineering (ingress shift). The fact that all of these events can be detected in a straightforward manner from whole-network traffic data is one of the principal contributions of our work. The count of each type of anomaly found is shown in Table 3. The most prevalent anomaly type is the alpha flow, which is primarily detected in byte and packet traffic. The high prevalence of Alpha flows is due to the bandwidth-measurement experiments routinely run over Abilene; thus, a commercial network would probably not show a similar pattern. We detected a large amount of network and port scanning, and a similarly large number of flash-crowd events. Operational events (equipment outages and customer traffic shifts) are less frequent. Table 3 also illustrates the different kind of information that is present in each type of traffic. Alpha flows tend to be detected as
5 Anomaly Definition Features Examples ALPHA Unusually high rate point to point byte transfer [1]. DOS, DDOS FLASH CROWD SCAN (Distributed) Denial of service attack against a single victim. Unusually large demand for a resource/service []. Scanning a host for a vulnerable port (port scan) or scanning the network for a target port (network scan) WORM Self-propogating code that spreads across a network by exploiting security flaws. POINT TO MULTI- POINT OUTAGE INGRESS- SHIFT Distribution of content from one server to many users. Events that cause decrease in traffic exchanged between an OD pair. Customer shifts traffic from one ingress point to another ingress point. Spike in B, P and BP traffic, attributable to a single dominant pair (source and destination). Short duration (less than mins), and limited to single OD flow. Spike in P, F or FP traffic, the dominant fraction of which is destined to a single destination IP, with no dominant source IP. Can involve multiple OD flows and typically last less than 0mins. Spike in F or FP traffic towards a dominant destination IP and dominant destination port. Typically short-lived and limited to a single OD flow. Spike in F traffic, with similar number of packets as flows from a dominant source; no dominant combination of destination IP and port. Can involve multiple OD flows and typically last less than mins. Spike in F traffic with no dominant destination, and only a dominant port. Spike in P, B or BP traffic from a dominant source to numerous destinations, all at the same (well known) port. Decrease in BFP traffic, usually to zero. Can last for long duration (hours) and in all instances, affected multiple OD flows. Decrease in F traffic for one OD flow and a spike in F traffic for another. No dominant attribute. Involves multiple OD flows. Bandwidth measurement experiments by [] and [0]. Multiple instances where a large number of packets are sent to a single destination IP at ports that are frequent targets of DOS attacks (e.g., port 0) Multiple instances of large number of web requests to single IP (port 80). Network scans for port 139 (NetBIOS). Found flows with dominant port 133 (known to be used by the MS SQL- Snake worm). Single server broadcasts at port 119 (news nntp service) to large destination set. Instances of scheduled maintanance downtime (verified by [1]) at LOSA PoP on /17, and a measurement failure from CHIN PoP on 1/1. Multihomed Abilene customer CAL- REN shifted its traffic from LOSA to SNVA during LOSA outage. Table : Types of anomalies, with their attributes as seen in sampled network-wide flow measurements. The examples are actual anomalies detected by the subspace method and identified from manual inspection. byte or packet anomalies; this makes sense since the root cause of these events is an attempt to move a large amount of data over the network. DoS events tend to be detected as flow or packet anomalies, but not as byte anomalies; this makes sense since the purpose of the attack is to generate interrupts and other per-packet effects on the target, but not to move a large amount of payload data. Scan events are naturally flow anomalies; each new combination of port and target IP generates a new flow, without trasmitting an unusually large number of packets or bytes. Finally, flash events are also naturally flow anomalies because each source IP generates a distinct flow. Finally, we note that the table illustrates the remarkably low false alarm rate of the subspace method. Only about 8% of the anomalies detected turned out to be false alarms. Thus almost any anomaly detected by this method appears to be of interest to network operators, whether as a case of unusual user behavior, or malicious user activity, or significant operational events. Note however that about % of the anomalies detected could not be classified; we believe that this is largely an effect of our less-than-perfect (i.e., manual) anomaly classification methods and that further study would probably uncover the causes of these anomalies as well. 5. RELATED WORK To the best of our knowledge, this is the first work to expose and characterize the breadth of network-wide traffic anomalies that can be detected from sampled flow measurements in an IP network. The general area of classifying network anomalies (not necessarily traffic anomalies) has received much attention recently. Researchers have characterized Internet intrusion activity [5], failure events in IP networks [18], and also constructed taxonomies for Internet worms [], denial of service attacks [9] and defenses [19]. Earlier related work has focused on detecting and classifying anomalies from flow measurements taken at a single router or link. Barford et al employed a wavelet-based signal analysis of flow traffic to characterize single-link byte anomalies [3]. In [6], Duffield et al proposed techniques to infer the population of worm infections from sampled traffic measurements. The authors of [] provided topological clustering heuristics for a web server to distinguish denial of service attacks from flash crowd behavior. We use a simplified version of their heuristic to distinguish these two anomalies. The authors in [1] devised a number of heuristics to detect specific attack patterns from flow header data, although no evaluation on real data is given. The principal distinguishing feature of our work is that we characterize a wide range of network-wide (as opposed to single-link) traffic anomalies, by aggregating sampled flow measurements at the origin-destination level. 6. CONCLUSION AND FUTURE WORK In this paper, we showed how to harness the wealth of information that is present in sampled traffic flows to detect and understand network-wide anomalies. We showed that whole network anomalies can be accurately detected from aggregating traffic flows at the level of Origin-Destination flows, and by employing the three readily available traffic types: # of bytes, # of packets and # of IP-flows.
6 Type ALPHA DOS SCAN FLASH POINT MU- WORM OUTAGE INGRESS- Unknown False LTIPOINT SHIFT Alarm B F P BP FP BFP Total Table 3: Range of anomalies found for each traffic type. We illustrated that a remarkable breadth of anomalies, ranging from unusual customer behavior to malicious activity to network failures, can be detected by applying the subspace method to such data. Our work thus forms the first characterization of traffic anomalies that span an IP network. Our ongoing work is centered on further validating the subspace method and developing extensions for automatic anomaly classification. Thus this paper constitutes a first but promising step towards our broader goal of practical, online diagnosis of networkwide anomalies. 7. ACKNOWLEDGEMENTS We are grateful to Rick Summerhill, Mark Fullmer (Internet ), Matthew Davy (Indiana University) for helping us collect and understand the flow measurements from Abilene. 8. REFERENCES [1] Abilene Network Operations Center Weekly Reports. At [] S. Agarwal, C.-N. Chuah, S. Bhattacharyya, and C. Diot. The Impact of BGP Dynamics on Intra-Domain Traffic. In ACM SIGMETRICS, New York, June 00. [3] P. Barford, J. Kline, D. Plonka, and A. Ron. A Signal Analysis of Network Traffic Anomalies. In Internet Measurement Workshop, Marseille, November 00. [] Cisco NetFlow. At [5] Deloader Worm Description. At http: // [6] N. Duffield, C. Lund, and M. Thorup. Estimating Flow Distributions from Sampled Flow Statistics. In ACM SIGCOMM, Karlsruhe, August 003. [7] R. Dunia and S. J. Qin. Multi-dimensional Fault Diagnosis Using a Subspace Approach. In American Control Conference, [8] A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True. Deriving Traffic Demands for Operational IP networks: Methodology and Experience. In IEEE/ACM Transactions on Neworking, pages 65 79, June 001. [9] A. Hussain, J. Heidemann, and C. Papadopoulos. A Framework for Classifying Denial of Service Attacks. In ACM SIGCOMM, Karlsruhe, August 003. [] J. Jung, B. Krishnamurthy and M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In World Wide Web Conference, Hawaii, May 00. [11] J. E. Jackson. A User s Guide to Principal Components. John Wiley, New York, NY, [1] J. E. Jackson and G. S. Mudholkar. Control Procedures for Residuals Associated with Principal Component Analysis. Technometrics, pages 31 39, [13] Juniper Traffic Sampling. At software/junos/junos60/swconfig60-policy/html/ sampling-overview.html. [1] M.-S. Kim, H.-J. Kang, S.-C. Hung, S.-H. Chung, and J. W. Hong. A Flow-based Method for Abnormal Network Traffic Detection. In IEEE/IFIP Network Operations and Management Symposium, Seoul, April 00. [15] A. Lakhina, M. Crovella, and C. Diot. Characterization of Network-Wide Anomalies in Traffic Flows. Technical Report BUCS-00-00, Boston University, 00. [16] A. Lakhina, M. Crovella, and C. Diot. Diagnosing Network-Wide Traffic Anomalies. In ACM SIGCOMM, Portland, August 00. [17] A. Lakhina, K. Papagiannaki, M. Crovella, C. Diot, E. D. Kolaczyk, and N. Taft. Structural Analysis of Network Traffic Flows. In ACM SIGMETRICS, New York, June 00. [18] A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C.-N. Chuah, and C. Diot. Characterization of Failures in an IP Backbone. In IEEE INFOCOM, Hong Kong, April 00. [19] J. Mirkovic and P. Reiher. A Taxonomy of DDoS Attacks and Defense Mechanisms. ACM CCR, April 00. [0] Pathdiag: Network Path Diagnostic Tools. At web0/pathdiag/. [1] S. Sarvotham, R. Riedi, and R. Baraniuk. Network Traffic Analysis and Modeling at the Connection Level. In Internet Measurement Workshop, San Francisco, November 001. [] SLAC Internet End-to-end Performance Monitoring (IEPM-BW project). At [3] R. Teixeira, A. Shaikh, T. Griffin, and J. Rexford. Dynamics of Hot-Potato Routing in IP Networks. In ACM SIGMETRICS, New York, June 00. [] N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A Taxonomy of Computer Worms. In ACM CCS Workshop on Rapid Malcode (WORM), October 003. [5] V. Yegneswaran, P. Barford, and J. Ullrich. Internet Intrusions: Global Characteristics and Prevalence. In ACM SIGMETRICS, San Diego, June 003.
Mining Anomalies in Network-Wide Flow Data. Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot
Mining Anomalies in Network-Wide Flow Data Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot SANOG-7, Mumbai, January, 00 Network Anomaly Diagnosis Am I being attacked? Is someone scanning
Structural Analysis of Network Traffic Flows Eric Kolaczyk
Structural Analysis of Network Traffic Flows Eric Kolaczyk Anukool Lakhina, Dina Papagiannaki, Mark Crovella, Christophe Diot, and Nina Taft Traditional Network Traffic Analysis Focus on Short stationary
Structural Analysis of Network Traffic Flows
Structural Analysis of Network Traffic Flows Anukool Lakhina, Konstantina Papagiannaki, Mark Crovella, Christophe Diot, Eric D. Kolaczyk, and Nina Taft ABSTRACT Network traffic arises from the superposition
Detecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
Diagnosing Network Disruptions with Network-Wide Analysis
Diagnosing Network Disruptions with Network-Wide Analysis Yiyi Huang, Nick Feamster, Anukool Lakhina, Jun (Jim) Xu College of Computing, Georgia Tech, Guavus, Inc. ABSTRACT To maintain high availability
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS Nita V. Jaiswal* Prof. D. M. Dakhne** Abstract: Current network monitoring systems rely strongly on signature-based and supervised-learning-based
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Joint Entropy Analysis Model for DDoS Attack Detection
2009 Fifth International Conference on Information Assurance and Security Joint Entropy Analysis Model for DDoS Attack Detection Hamza Rahmani, Nabil Sahli, Farouk Kammoun CRISTAL Lab., National School
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Measuring the Shared Fate of IGP Engineering and Interdomain Traffic
Measuring the Shared Fate of IGP Engineering and Interdomain Traffic Sharad Agarwal Microsoft Research [email protected] Antonio Nucci Narus, Inc. [email protected] Supratik Bhattacharyya Sprint ATL
IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources
IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources Matthew Roughan (Univ. of Adelaide) Tim Griffin (Intel Research Labs) Z. Morley Mao (Univ. of Michigan) Albert Greenberg,
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Analyzing Large DDoS Attacks Using Multiple Data Sources
Analyzing Large DDoS Attacks Using Multiple Data Sources Z. Morley Mao University of Michigan [email protected] Vyas Sekar Carnegie Mellon University [email protected] Oliver Spatscheck AT&T Labs-Research
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Effect of sampling rate and monitoring granularity on anomaly detectability
Effect of sampling rate and monitoring granularity on anomaly detectability Keisuke Ishibashi, Ryoichi Kawahara, Mori Tatsuya, Tsuyoshi Kondoh and Shoichiro Asano Information Sharing Platform Labs. NTT
How is SUNET really used?
MonNet a project for network and traffic monitoring How is SUNET really used? Results of traffic classification on backbone data Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
Characteristics of Network Traffic Flow Anomalies
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic
Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: [email protected] Abstract A Controller-Agent
Analyzing Large DDoS Attacks Using Multiple Data Sources
Analyzing Large DDoS Attacks Using Multiple Data Sources Z. Morley Mao, Vyas Sekar, Oliver Spatscheck, Jacobus van der Merwe, Rangarajan Vasudevan University of Michigan, zmao,ranga @eecs.umich.edu Carnegie
A Novel Packet Marketing Method in DDoS Attack Detection
SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Dynamics of Prefix Usage at an Edge Router
Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, [email protected]}
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
Characterization and Analysis of NTP Amplification Based DDoS Attacks
Characterization and Analysis of NTP Amplification Based DDoS Attacks L. Rudman Department of Computer Science Rhodes University Grahamstown [email protected] B. Irwin Department of Computer Science
Get Your FIX: Flow Information export Analysis and Visualization
Get Your FIX: Flow Information export Analysis and Visualization Joint Techs Workshop, Madison, Wisconsin, July 19, 2006 Dave Plonka [email protected] Division of Information Technology, Computer Sciences
Design and simulation of wireless network for Anomaly detection and prevention in network traffic with various approaches
IJISE - International Journal of Innovative Science, Engineering & echnology, Vol. 1 Issue 5, July 2014. Design and simulation of wireless network for Anomaly detection and prevention in network traffic
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia [email protected] Tianfu Fu [email protected] Cheng He Danping He [email protected]
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
DDoS Attacks and Defenses Overview
DDoS Attacks and Defenses Overview Pedro Pinto 1 1 ESTG/IPVC Escola Superior de Tecnologia e Gestão, Intituto Politécnico de Viana do Castelo, Av. do Atlântico, 4900-348 Viana do Castelo, Portugal [email protected]
Reformulating the monitor placement problem: Optimal Network-wide wide Sampling
Reformulating the monitor placement problem: Optimal Network-wide wide Sampling Gianluca Iannaccone Intel Research @ Cambridge Joint work with: G. Cantieni,, P. Thiran (EPFL) C. Barakat (INRIA), C. Diot
Inferring Internet Denial-of
Inferring Internet Denial-of of-service Activity Geoffrey M. Voelker University of California, San Diego Joint work with David Moore (CAIDA/UCSD) and Stefan Savage (UCSD) Simple Question We were interested
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
Monitoring of Internet traffic and applications
Monitoring of Internet traffic and applications Chadi BARAKAT INRIA Sophia Antipolis, France Planète research group ETH Zurich October 2009 Email: [email protected] WEB: http://www.inria.fr/planete/chadi
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude
Impact of BGP Dynamics on Router CPU Utilization
Impact of BGP Dynamics on Router CPU Utilization Sharad Agarwal 1, Chen-Nee Chuah 2, Supratik Bhattacharyya 3, and Christophe Diot 4 1 University of California, Berkeley, USA, [email protected]
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
A Flow-based Method for Abnormal Network Traffic Detection
A Flow-based Method for Abnormal Network Traffic Detection Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong Dept. of Computer Science and Engineering POSTECH {mount,
A System for in-network Anomaly Detection
A System for in-network Anomaly Detection Thomas Gamer Institut für Telematik, Universität Karlsruhe (TH), Germany Abstract. Today, the Internet is used by companies frequently since it simplifies daily
Filtering Based Techniques for DDOS Mitigation
Filtering Based Techniques for DDOS Mitigation Comp290: Network Intrusion Detection Manoj Ampalam DDOS Attacks: Target CPU / Bandwidth Attacker signals slaves to launch an attack on a specific target address
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
On the Use of Traffic Monitoring and Measurements for Improving Networking
On the Use of Traffic Monitoring and Measurements for Improving Networking Sílvia Farraposo 1, Philippe Owezarski 2, Edmundo Monteiro 3 1 Escola Superior de Tecnologia e Gestão de Leiria, Morro do Lena
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
Detecting UDP attacks using packet symmetry with only flow data
University of Twente Department of Electrical Engineering, Mathematics an Computer Science Chair for Design and Analysis of Communication Systems Detecting UDP attacks using packet symmetry with only flow
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks
DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks Jae-Hyun Jun School of Computer Science and Engineering Kyungpook National University [email protected] Cheol-Woong Ahn
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN ABSTRACT Muraleedharan N and Arun Parmar Centre for Development of Advanced Computing (C-DAC) Electronics City, Bangalore, India {murali,parmar}@ncb.ernet.in
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu Dept. of Information Engineering Chinese University of Hong Kong Email: [email protected] D. M. Chiu
Probability-Model based Network Traffic Matrix Estimation
Computer Science and Information Systems ():309 30 DOI: 0.98/CSIS3000T Probability-Model based Network Traffic Matrix Estimation Hui Tian, Yingpeng Sang, Hong Shen 3,4, and Chunyue Zhou School of Electronics
Hybrid network traffic engineering system (HNTES)
Hybrid network traffic engineering system (HNTES) Zhenzhen Yan, Zhengyang Liu, Chris Tracy, Malathi Veeraraghavan University of Virginia and ESnet Jan 12-13, 2012 [email protected], [email protected] Project
Internet Worm Classification and Detection using Data Mining Techniques
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. 1 (May Jun. 2015), PP 76-81 www.iosrjournals.org Internet Worm Classification and Detection
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
How to Detect and Prevent Cyber Attacks
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Fine-Grained DDoS Detection Scheme Based on Bidirectional Count Sketch
Fine-Grained DDoS Detection Scheme Based on Bidirectional Count Sketch Haiqin Liu, Yan Sun, and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington
RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.
: Real-time Inter-network Defense Against Denial of Service Attacks Kathleen M. Moriarty 22 October 2002 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations,
ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY
CANADIAN APPLIED MATHEMATICS QUARTERLY Volume 12, Number 4, Winter 2004 ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY SURREY KIM, 1 SONG LI, 2 HONGWEI LONG 3 AND RANDALL PYKE Based on work carried out
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider
