Capturing DDoS Attack Dynamics behind the Scenes
|
|
|
- Junior Payne
- 10 years ago
- Views:
Transcription
1 Capturing DDoS Attack Dynamics behind the Scenes An Wang 1, Aziz Mohaisen 2, Wentao Chang 1, and Songqing Chen 1 1 Department of Computer Science, George Mason University 2 Verisign Labs {awang1, wchang7, sqchen}@gmu.edu [email protected] Abstract. Despite continuous defense efforts, DDoS attacks are still very prevalent on the Internet. In such arms races, attackers are becoming more agile and their strategies are more sophisticated to escape from detection. Effective defenses demand in-depth understanding of such strategies. In this paper, we set to investigate the DDoS landscape from the perspective of the attackers. We focus on the dynamics of the attacking force, aiming to explore the attack strategies, if any. Our study is based on 5,74 different Internet DDoS attacks. Our results indicate that attackers deliberately schedule their controlled bots in a dynamic fashion, and such dynamics can be well captured by statistical distributions. 1 Introduction Internet Distributed Denial of Service (DDoS) attacks have been a challenge for many years. Today, many DDoS attacks are launched via different botnets. Recent years have witnessed the rapid increase of such DDoS attacks in terms of both the number and the volume. For example, according to a recent attack report for Q2 214 by Prolexic [19], compared to Q2 a year ago, the average bandwidth of DDoS attacks was up 72%, and the peak bandwidth increased 241%, while the attack duration was only half as long. As a matter of fact, today botnet DDoS attacks have become a mainstream commodity in the cybercrime ecosystem, where they could be rented or loaned. To understand the fundamentals of DDoS attacks and defend against them, enormous efforts are continuously made from both academia and industry [3,8,16,21]. Driven by the underlying profits and the lifted bar by the ever-improving defense mechanisms, DDoS attacking strategies are becoming increasingly sophisticated in order to evade various detection systems. Therefore, a timely and in-depth understanding of latest DDoS attack strategies is a key to improve the existing defenses. However, most of our understanding of DDoS attacks is based on the indirect traffic measures and static characterization of DDoS attacks [5,21,6,8,15,14]. For example, our previous study shows that most DDoS attacks today are not widely distributed, but highly regionalized [21]. Most of such characterizations only touch the surface of attackers strategies, which is far from sufficient for us to design more effective defenses against many attacks. To win the arms race, we set out to investigate the attacking strategies behind the scenes. For this purpose, we aim to explore the attackers strategies in deploying the attack force, focusing on the dynamic control of the attack forces in different DDoS attacks. Our study is based on a DDoS dataset collected for a period of 7 continuous
2 2 months. Our dataset was provided by Team Cymru and is collected using passive and active techniques from multiple anchor points. The data was collected from August 28, 212 to March 24, 213, a total of 29 days (about seven months of valid and marked attack logs). In this seven-month period, a total of 5,74 different DDoS attacks were observed more details are in [4]. Through our analysis, we find several interesting results. We find that a botnet family often uses a limited number of sophisticated patterns in dynamically scheduling bots to participate in various DDoS attacks. This dynamic scheduling is indicated by the shifting patterns of participating bots. Further, the bot shifting pattern in different botnet families can be well captured by statistical distributions, with parameters depending on the corresponding family. The preliminary findings in this study not only refresh our understanding of today s Internet DDoS attacks, but also offer new insights for security analysts to identify botnet families and help predict how the attacking forces evolve over time during attacks. The rest of the paper is organized as follows. In Section 2, we describe our dataset including the overall data statistics and the data fields we utilized for our analysis. In Section 3, we study the bot shifting pattern of each botnet family, the basic characteristics of each pattern We discuss related work in Section 4 and conclude with a concise summary of our analyses and their implications in Section 5. 2 Dataset Collection The dataset is based on Team Cymru s constant monitoring of Internet critical infrastructure to aid intelligence gathering concerning the state of the art of attack posture, using both active and passive measurement techniques. Even though there might be some potential skews in our dataset, our preliminary studies [21,5,4] suggest that our dataset still preserves the geographical features of botnet families. The unit constantly monitors Internet attacking traffic to aid the mitigation efforts of its customers, using both active and passive measurement techniques. For active measurements and attribution, malware families used in launching the various attacks are reverse engineered, and labeled to a known malware family using best practices. A honeypot is then created to emulate the operation of the reverse-engineered malware sample and to enumerate all bots across the globe participating in the particular botnet. A similar approach has been proposed by Kang et al. [9] As each botnet evolves over time, new generations are marked by their unique hashes. Traces of traffic associated with various DDoS campaigns are then collected at various anchor points across the globe in cooperation with various ISPs. The traces are then analyzed to attribute and characterize attacks on various targets. The collection of traffic is guided by two general principles: 1) that the source of the traffic is an infected host participating in a DDoS campaign, and 2) the destination of the traffic is a targeted client, as concluded from eavesdropping on C&C of the campaign using a live sample, or where the end-host is a customer of the said DDoS mitigation company. The analysis is high level in nature to cope with the high volume of ingest traffic at peak attack times as shown later, on average there were 243 simultaneous verified DDoS attacks launched by the different botnets studied in this work. High level statistics associated with the various botnets and DDoS attacks are recorded every one hour. The
3 3 Table 1. Summary of the workload information Summary of Attackers Summary of Victims description count description count # of bot ips 3195 # of target ip 926 # of cities 2897 # of cities 616 # of countries 186 # of countries 84 # of organizations 3498 # of organizations 174 # of asn 3973 # of asn 126 workload we obtained ranges from August 28, 212 to March 24, 213, a total of 29 days (about seven months of valid and marked attack logs). In the log, a DDoS attack is labeled with a unique DDoS identifier, corresponding to an attack by given DDoS malware family on a given target. We cannot reveal the capability of the capturing facility because attackers would learn such information, which is also critical to the business of the data source. Table 1 sums up some statistics of our dataset, including information from both the attacker and the target sides. Over a period of 28 weeks, 5,74 different DDoS attacks were observed. These attacks are launched by 674 different botnets. These attacks targeted victims located in 84 different countries, 616 cities, involving 174 organizations, residing in 126 different autonomous systems. In our analysis, we focus on the botnets involved in DDoS attacks. However, [4] contains more detailed information about botnet family activities and patterns. The attackers IP information enables us to study the geolocation distribution of each botnet family. Contrary to the traditional understanding of DDoS attacks, the attacks are not very distributed but rather highly regionalized [21]. Each family has its own geolocation preferences. Among all the families, Dirjumper covers the largest number of countries: 164. A comparable coverage is Optima s: 153. Even though these families have very broad country coverages, the average number of bots participating in each attack pertaining to those botnets is small. 3 Attack Dynamics To seek an in-depth understanding of attackers strategies, we set to explore attacks from the adversary s perspective. By doing that, we are motivated to find out how their controlled bots are scheduled to participate in attacks. To this end, we use the IP information of the bots captured in our dataset. Our analysis starts off from two different perspectives, namely the bot shift pattern dynamics and the multi-owned bot attacking interval, both of which are related to DDoS attack strategies. For any DDoS attack, it evolves over time in terms of the attacking force. In our dataset, each entry represents a snapshot of the DDoS attacks captured at that time point. As a result, each DDoS can be represented by a chronological sequence of snapshots. Dynamic characterizations can be captured by analyzing each data record. For each entry in our dataset, we have the IP information of all the bots participating in that DDoS attack at that moment, of which the country code (cc) could also be
4 4 obtained from such information (the snapshots are updated hourly). Thus, the dataset contains all the IP information of bots involved. After further organizing the bots based on their country code, each entry in the dataset can be denoted by < cc 1 : n 1, cc 2 : n 2,..., cc m : n m > where each cc i, i [1... m] represents the country code where the bots locate; while for each n i, i [1... m] denotes the number of bots located in cc i, i [1... m]. Since each of such vector represents a snapshot, so if we line up all the vectors belonging to the same DDoS attack together, we can observe the deployment differences by comparing the number of bots in each country and the number of countries involved. For example, if we have two such records, denoted by vec 1 and vec 2, the change can be denoted by vec 2 vec 1 =< cc 1 : 1, cc 2 : 2,..., cc j : j >= vec v. Notice that the lengths of vec 1 and vec 2 may not be equal and the length of vec v will be the same as the longer one. Thus, the difference vector reflects the changes of the bots numbers at the country level for the the given attack, which is defined as shift in our analysis. To further quantify such changes, we use the notion of shift expectation to represent each attacking force shift. In another word, each vector described above will be denoted by a single value called shift expectation, whose calculation will be elaborated later. In this way, each DDoS attack can be denoted by a vector whose elements are shift expectation, i.e. < E shift1, E shift2,..., E shiftm >, since each DDoS attack can be denoted by a time series of snapshots. And the length of this vector is determined by both the number of magnitude changes happened in each attack as well as the number of snapshots taken for each attack. m The shift expectation is calculated as p i i, where i is obtained from vec v i=1 and p i denotes the probability estimator of the shift. And p i is computed as follows. From our dataset, we obtain the geolocation information of all bots involved in the DDoS attacks. For each family, we generate a table that has two columns; the first column contains all the country codes that are covered by this family while the second one has the corresponding number of bots that locate in that country. So each entry in this table is denoted by (cc i, n i ), for i [1... l]. On the other hand, p i, i [1... l], is calculated as n i l j=1 n. With both p i and i, the expectation of each shift E shift can j be calculated. After converting each DDoS attack into a time series vector, we have all the vectors with various lengths for all the DDoS attacks in our dataset. Our following analyses will be built on top of these vectors. 3.1 Bots shift pattern analysis First, we use the K-means clustering on all attack vectors of each family. Since the lengths of vectors may vary, we cannot calculate the Euclidean distance between vectors directly. The Dynamic Time Warping (DTW) has been widely used for shape matching and time series classification. Accordingly, we use DTW to calculate the distance and similarity between attack vectors. To reduce the distortion under the influence of attack magnitude, we normalize the vector before we calculate the DTW distance on them. The results are shown in Figure 1 - Figure 4. In these figures, x-axis represents Shift Times, which is determined by the number of snapshots belonging to each DDoS
5 Shift Expectation Shift Times Attack ID Shift Expectation Shift Times Attack ID Fig. 1. Dirtjumper: attacks with same bot shift pattern Fig. 2. Dirtjumper: attacks with similar bot shift pattern Shift Expectation Shift Times Attack ID Shift Expectation Shift Times Attack ID Fig. 3. Pandora: attacks with same bot shift pattern Fig. 4. Pandora: attacks with similar bot shift pattern attack; y-axis represents Attack ID, which is used to differentiate different DDoS attacks; z-axis represents the calculated Shift Expectation values. Figure 1 and Figure 2 illustrate two of the four largest clusters discovered by the K-means algorithm of the Dirtjumper family, where K = 1. We cluster these vectors into 5, 1, and 2 clusters. It is shown that clustering them into 1 clusters yields better results. So, we present the two largest clusters of the 1 clusters for brevity. The two clusters contain 54 and 24 attacks, respectively. In each figure, the x-axis represents the length of the attack vector, i.e., the shifts happened in a single attack; the y-axis represents the unique DDoS ID; and the z-axis represents the shift expectation of each shift. Note that since Dirtjumper has too many DDoS attacks with different lengths of shifts, we first group the attacks by size. In this study, we focus on the analysis of attack vectors that have more than 1 shifts, which include 242 attacks launched by Dirtjumper. Our following analyses are based on this subset of our dataset as well. In these figures, the expectations should be discrete values. To more clearly show the changes, we use lines to connect these dots. Figure 1 shows that in these attacks, bots are being scheduled with the exact same pattern in different attacks, while Figure 2 indicates a similar pattern although not identically in different attacks. With further inspection, we find that in Figure 1 there are 46 simultaneous DDoS attacks ongoing to-
6 CDF cluster_1 cluster_1 cluster_2 cluster_3 cluster_4 cluster_5 cluster_6 cluster_7 cluster_8 cluster_ Normalized Distance to Cluster Centroids Fig. 5. Vector Distances CDF wards the same target located in Finland, which is a company providing communication services from basic broadband to high-speed fiber connections. These results suggest that the attacking forces are not randomly scheduled by the attackers in Dirtjumper. Also, simultaneous attacks cannot be arranged by a completely random deployment strategy. There has to be certain strategies behind DDoS attacks launched by each family. To see if such a pattern is specific to Dirtjumper or generalizable to others, we examine other families. Figure 3 and Figure 4 illustrate two clusters of another active botnet family Pandora. We use the same K-means clustering with 1 clusters for attacks and more than 1 shifts as before. We have similar observations on Pandora as on Dirtjumper. While other families show similar results, we omit them due to page limit. These findings also suggest that there might be a way to detect DDoS attacks based on these shift behaviors. But this only will be possible if we can precisely model these pattern, which is the aim of our next step. 3.2 Mathematical representation of shift patterns To further explore the pattern behind these vectors, we first find the centroid vector of each cluster and then calculate the distance between each attack vector in that cluster and the centroid. The centroid vector cannot be calculated simply by averaging all the vectors involved since they are of different length. We define centroid vector as the vector that has the smallest total distance to all other vectors. And all the distances involved are measured by DTW distance. We use Dirtjumper as an example since it is the most active family. The CDF of the distance distribution for Dirtjumper is shown in Figure 5. In this figure, each curve represents a cluster. If we observe these curves, the distances seem to follow the normal distribution very well except for cluster-1. To verify the distribution, we further fit the data into multiple distributions, including tlocationscale distribution,
7 7 6 5 Probability Density Function empirical tlocationscale logistic normal extreme value Probability Density Normalized Distance to Cluster Centroids Fig. 6. Distribution Fit normal distribution, logistic distribution and extreme value distribution. The fitting results are shown in Figure 6. Except for the extreme value distribution, all other distribution functions are symmetric distributions. Figure 6 shows that the data fit the tlocationscale distribution best. tlocationscale distribution is the generalized Student s t-distribution into location-scale family. Location-scale family is a family of univariate probability distributions parameterized by a location parameter and a non-negative scale parameter. The tlocationscale distribution is useful for modeling data distribution with heavier tails than the normal distribution, meaning that it is more prone to producing values that fall far from its mean. This makes it useful for understanding the statistical behavior of certain types of ratios of random quantities. In this case, the distribution describes the distances between multiple shift patterns of botnets. It means that if we use the centroids of different clusters as a baseline, we can learn and predict how the bots are going to shift based on this distribution. To this end, it is likely that attackers are utilizing this feature to arrange and control bots during attacks, especially with a large number of bots. From a defense perspective, such information can be very useful. On one hand, with this information even though there might be more than one shift pattern per family we can predict how attacks shift based on the distribution. On the other hand, we can simulate DDoS attacks behaviors, not only based on traffic volume but also by incorporating dynamics behind them. Similar to Figure 5, we also plotted a CDF for Pandora s clusters, which confirmed the similar behavioral patterns. However, compared to Dirtjumper, Pandora exhibits a slight deviation in the distribution, perhaps due to the smaller number of attacks in Pandora compared to Dirtjumper. Results obtained by analyzing other families reveal similar findings. Besides the pattern clustering graphs, Table 2 summarizes some statistical information about Pandora clusters. In this table, Size shows the size of each cluster; Max Diss
8 8 Table 2. Statistic Information of Pandora Cluster Size Max Diss Avg Diss Diameter Separation Avg Exp Max Exp Std represents the maximum distance between any two vectors in the same cluster; Diameter represents the largest dissimilarity between any two pairs of the observations within the same cluster; Separation represents the minimal dissimilarity between an observation of the cluster and an observation of another cluster; Avg Exp shows the average shift expectation of each cluster and Std is the standard deviation of expectations of each cluster. Statistically speaking, the smaller the Diameter, the better the cluster. From this table, we can see that the second cluster is the best, which also conforms with Figure 3. Another observation from this table is that for most clusters, the Diameter is larger than Separation, meaning that these clusters are not totally isolated. The total isolation means that the patterns might be attack-specific. However, results show the opposite: each cluster still shares some similarities with other clusters. This further indicates that there might be certain dynamic mechanisms behind each family. 4 Related Work DDoS attacks have been intensively investigated and numerous measurement works have been done to help achieve better understanding of them. In 26, Mao et al. [16] presented their measurement work of DDoS attacks relying on both direct measurement of flow-level information and more traditional indirect measurements using backscatter analysis. Moore et al. [17] conducted a backscatter analysis for quantitatively estimating DoS activity in the Internet based on a three-week dataset. Due to the growth of network address translation and firewall techniques, much of the Internet was precluded from the study by the traditional network measurement techniques. Thus, in the early days, the work [3] proposed an opportunistic measurement approach that leverages sources of spurious traffic, such as worms and DDoS backscatter, to unveil unseen portion of Internet. In 21, a more recent study [23] revisited the same topic and characterized the current state of background radiation specifically highlighting those which exhibit significant differences. Our work serves as a revisit to those studies with new insights. Bailey et al. [1] designed and implemented the Internet Motion Sensors (IMS), a globally scoped Internet monitoring system to detect Internet threats, which includes a distributed blackhole network with a lightweight responder and a novel payload signature and caching mechanism. Xu et al. [24] presented a general methodology to build behavior profiles of Internet backbone traffic in terms of communication patterns of end-hosts and services. In our work, we focus on DDoS dynamics. We use several techniques including K-means clustering and Dynamic Time Warping (DTW). DTW was first introduced in
9 9 the data mining community in the context of mining time series proposed by Berndt et al. [7]. Several techniques have been introduced to speed up DTW and to reduce the space overhead [12,11]. The K-means clustering methods we use were first proposed by Lloyd et al. [18]. And it remains a very popular method of clustering after many years perhaps due to the simplicity of the algorithm and its effectiveness in practice. These techniques successfully helped us discover the principles of the dynamics behind the scenes. Several other works focused on DDoS dynamics analysis as well, including Arne et al. [22], Armin et al. [2], Mohammad et al. [1], Kührer et al. [13]. In Stringhini et al. [2], a similar approach was proposed to model the country distribution of bots and cluster together botnets. 5 Conclusion DDoS attacks remain one of the most challenging threats on the Internet, despite numerous efforts to characterize, model, and defend against them. This indicates that increasingly sophisticated strategies are being employed by the DDoS attackers. Successful defenses demand in-depth understanding of their strategies. In this work, we have conducted a preliminary analysis on a large scale DDoS dataset, aiming to understand the dynamics of the DDoS attack strategies behind the scenes. With the help of Dynamic Time Warping and clustering, we have found that attackers are deliberately and dynamically deploying their attack forces in individual or collaborative attacks, indicating the strong bond and organization of different botnet families in various attacks. Furthermore, such dynamics can be well captured by statistical distributions. These results add to the existing literature of DDoS characterization and understanding. More importantly, they lay a promising foundation for us to predict the dynamics during a DDoS attack in the future, which could be utilized to enhance existing defenses. 6 Acknowledgment This work is partially supported by National Science Foundation (NSF) under grant CNS The views and opinions expressed in this paper are the views of the authors, and do not necessarily represent the policy or position of NSF or VeriSign, Inc. References 1. Bailey, M., Cooke, E., Jahanian, F., Nazario, J., Watson, D., et al.: The internet motion sensora distributed blackhole monitoring system. In: NDSS (25) 2. Büscher, A., Holz, T.: Tracking ddos attacks: Insights into the business of disrupting the web. In: Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Jose, CA, USA (212) 3. Casado, M., Garfinkel, T., Cui, W., Paxson, V., Savage, S.: Opportunistic measurement: Extracting insight from spurious traffic. In: Proc. 4th ACM Workshop on Hot Topics in Networks (Hotnets-IV) (25)
10 1 4. Chang, W., Mohaisen, A., Wang, A., Chen, S.: Measuring botnets in the wild: Some new trends. In: ACM ASIACCS (215) 5. Chang, W., Wang, A., Mohaisen, A., Chen, S.: Characterizing botnets-as-a-service. In: Proceedings of the ACM SIGCOMM (poster) (214) 6. Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical approaches to DDoS attack detection and response. In: DARPA Information Survivability Conference and Exposition (23) 7. J.Berndt, D., Clifford, J.: Using dynamic time warping to find patterns in time series. In: KDD workshop (1994) 8. Jin, S., Yeung, D.: A covariance analysis model for ddos attack detection. IEEE International Conference on Communications (24) 9. Kang, B.B., Chan-Tin, E., Lee, C.P., Tyra, J., Kang, H.J., Nunnery, C., Wadler, Z., Sinclair, G., Hopper, N., Dagon, D., et al.: Towards complete node enumeration in a peer-to-peer botnet. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. pp ACM (29) 1. Karami, M., McCoy, D.: Understanding the emerging threat of ddos-as-a-service. In: LEET (213) 11. Keogh, E., Ratanamahatana, C.A.: Exact indexing of dynamic time warping. In: Knowledge and Information Systems (25) 12. Kim, S.W., Park, S., W.Chu, W.: An index-based approach for similarity search supporting time warping in large sequence databases. In: Proceedings of International Conference on Data Engineering (21) 13. Kührer, M., Hupperich, T., Rossow, C., Holz, T.: Exit from hell? reducing the impact of amplification ddos attacks. In: USENIX Security Symposium (214) 14. Lee, K., Kim, J., Kwon, K.H., Han, Y., Kim, S.: DDoS attack detection method using cluster analysis. Expert Systems with Applications 34, (28) 15. Li, M.: Change trend of averaged hurst parameter of traffic under ddos flood attacks. Computers and Security (26) 16. Mao, Z.M., Sekar, V., Spatscheck, O., van der Merwe, J., Vasudevan, R.: Analyzing Large DDoS Attacks using Multiple Data Sources. In Proceedings of ACM SIGCOMM Workshop on Large-Scale Attack Defense (26) 17. Moore, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denialof-service activity. ACM Transactions on Computer Systems (TOCS) 24(2), (26) 18. P.Lloyd, S.: Least squares quantization in pcm. In: IEEE Transactions on Information Theory (1982) 19. Prolexic: Q2 214: Malicious actors switch tactics to build, deploy and conceal powerful botnets. knowledge-center-ddos-attack-report-214-q2.html (June 214) 2. Stringhini, G., Holz, T., Stone-Gross, B., Kruegel, C., Vigna, G.: BOTMAGNIFIER: Locating Spambots on the Internet. In: USENIX Security Symposium (211) 21. Wang, A., Chang, W., Mohaisen, A., Chen, S.: How distributed are today s ddos attacks? In: Proceedings of the ACM CCS (poster) (214) 22. Welzel, A., Rossow, C., Bos, H.: On measuring the impact of ddos botnets. In: Proceedings of the Seventh European Workshop on System Security. p. 3. ACM (214) 23. Wustrow, E., Karir, M., Bailey, M., Jahanian, F., Huston, G.: Internet background radiation revisited. In: Proceedings of the 1th ACM SIGCOMM conference on Internet measurement. pp ACM (21) 24. Xu, K., Zhang, Z.L., Bhattacharyya, S.: Profiling internet backbone traffic: behavior models and applications. In: ACM SIGCOMM Computer Communication Review. vol. 35, pp ACM (25)
Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System
Detection of DDoS Attack Using Virtual Security N.Hanusuyakrish, D.Kapil, P.Manimekala, M.Prakash Abstract Distributed Denial-of-Service attack (DDoS attack) is a machine which makes the network resource
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
Towards Autonomic DDoS Mitigation using Software Defined Networking
Towards Autonomic DDoS Mitigation using Software Defined Networking Authors: Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar NDSS Workshop on Security of Emerging Networking Technologies (SENT
How To Mitigate A Ddos Attack
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 3 3RD QUARTER 2014 CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS 4 Mitigations by Attack Size 4 Mitigations by Industry 5
Advanced Honeypot Architecture for Network Threats Quantification
Advanced Honeypot Architecture for Network Threats Quantification Mr. Susheel George Joseph M.C.A, M.Tech, M.Phil(CS) (Associate Professor, Department of M.C.A, Kristu Jyoti College of Management and Technology,
Denial of Service Attack Detection using Extended Analog Computers
Denial of Service Attack Detection using Extended Analog Computers Craig Shue, Brian Kopecky, Chris Weilemann Computer Science Department, Indiana University Bloomington, IN, U.S.A. {cshue, bkopecky, cweilema}@cs.indiana.edu
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
Measuring Botnets in the Wild: Some New Trends
Measuring Botnets in the Wild: Some New Trends Wentao Chang 1 Aziz Mohaisen An Wang 1 Songqing Chen 1 1 George Mason University Verisign Labs {wchang7, awang1, sqchen}@gmu.edu [email protected] ABSTRACT
We Know It Before You Do: Predicting Malicious Domains
We Know It Before You Do: Predicting Malicious Domains Abstract Malicious domains play an important role in many attack schemes. From distributing malware to hosting command and control (C&C) servers and
An Efficient Methodology for Detecting Spam Using Spot System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet
The Coremelt Attack Ahren Studer and Adrian Perrig 1 We ve Come to Rely on the Internet Critical for businesses Up to date market information for trading Access to online stores One minute down time =
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
A Flow-based Method for Abnormal Network Traffic Detection
A Flow-based Method for Abnormal Network Traffic Detection Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong Dept. of Computer Science and Engineering POSTECH {mount,
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,
Monitoring Performances of Quality of Service in Cloud with System of Systems
Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Analyzing Large DDoS Attacks Using Multiple Data Sources
Analyzing Large DDoS Attacks Using Multiple Data Sources Z. Morley Mao, Vyas Sekar, Oliver Spatscheck, Jacobus van der Merwe, Rangarajan Vasudevan University of Michigan, zmao,ranga @eecs.umich.edu Carnegie
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer
LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic
LASTLINE WHITEPAPER The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic Abstract A distinguishing characteristic of bots is their ability to establish a command and
2-5 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks
2-5 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks A darknet is a set of globally announced unused IP addresses and using it is a good way to monitor
Analyzing Large DDoS Attacks Using Multiple Data Sources
Analyzing Large DDoS Attacks Using Multiple Data Sources Z. Morley Mao University of Michigan [email protected] Vyas Sekar Carnegie Mellon University [email protected] Oliver Spatscheck AT&T Labs-Research
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
A TASTE OF HTTP BOTNETS
Botnets come in many flavors. As one might expect, these flavors all taste different. A lot of Internet users have had their taste of IRC, P2P and HTTP based botnets as their computers were infected with
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Literature Review: Network Telescope Dashboard and Telescope Data Aggregation
Literature Review: Network Telescope Dashboard and Telescope Data Aggregation Samuel Oswald Hunter 20 June 2010 1 Introduction The purpose of this chapter is to convey to the reader a basic understanding
CHAPTER 4 : CASE STUDY WEB APPLICATION DDOS ATTACK GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: CASE STUDY WEB APPLICATION DDOS ATTACK 1 WEB APPLICATION DDOS ATTACK CASE STUDY MORAL Ensuring you have DoS/DDoS protection in place, before you are attacked, can pay off. OVERVIEW XYZ Corp (name changed
DISCLOSING MALICIOUS TRAFFIC FOR NETWORK SECURITY
DISCLOSING MALICIOUS TRAFFIC FOR NETWORK SECURITY Kamal Shah and Tanvi Kapdi Thakur College of Engineering and Technology, Mumbai University, Mumbai-400101, India ABSTRACT Network anomaly detection is
Traffic Analysis. Scott E. Coull RedJack, LLC. Silver Spring, MD USA. Side-channel attack, information theory, cryptanalysis, covert channel analysis
Traffic Analysis Scott E. Coull RedJack, LLC. Silver Spring, MD USA Related Concepts and Keywords Side-channel attack, information theory, cryptanalysis, covert channel analysis Definition Traffic analysis
Network Intrusion Simulation Using OPNET
Network Intrusion Simulation Using OPNET Shabana Razak, Mian Zhou, Sheau-Dong Lang* School of Electrical Engineering & Computer Science and National Center for Forensic Science* University of Central Florida,
Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
Signal Processing Methods for Denial of Service Attack Detection
0 Signal Processing Methods for Denial of Service Attack Detection Urbashi Mitra Ming Hsieh Department of Electrical Engineering Viterbi School of Engineering University of Southern California Los Angeles,
Detecting UDP attacks using packet symmetry with only flow data
University of Twente Department of Electrical Engineering, Mathematics an Computer Science Chair for Design and Analysis of Communication Systems Detecting UDP attacks using packet symmetry with only flow
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
TrustGuard: A Flow-level Reputation-based DDoS Defense System
TrustGuard: A Flow-level Reputation-based DDoS Defense System Haiqin Liu, Yan Sun, Victor C. Valgenti, and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia [email protected] Tianfu Fu [email protected] Cheng He Danping He [email protected]
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
Symantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
Malware Detection in Android by Network Traffic Analysis
Malware Detection in Android by Network Traffic Analysis Mehedee Zaman, Tazrian Siddiqui, Mohammad Rakib Amin and Md. Shohrab Hossain Department of Computer Science and Engineering, Bangladesh University
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
A Hybrid Approach for Detecting, Preventing, and Traceback DDoS Attacks
A Hybrid Approach for Detecting, Preventing, and Traceback DDoS Attacks ALI E. EL-DESOKY 1, MARWA F. AREAD 2, MAGDY M. FADEL 3 Department of Computer Engineering University of El-Mansoura El-Gomhoria St.,
A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks
A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks SHWETA VINCENT, J. IMMANUEL JOHN RAJA Department of Computer Science and Engineering, School of Computer Science and Technology
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION
DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION Stephen Gates Chief Security Evangelist Corero Network Security Session ID: SEC-W04 Session Classification: Intermediate Recent Headlines Are Denial of
Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity
Prevention, Detection and Mitigation of DDoS Attacks Randall Lewis MS Cybersecurity DDoS or Distributed Denial-of-Service Attacks happens when an attacker sends a number of packets to a target machine.
Exploring Big Data in Social Networks
Exploring Big Data in Social Networks [email protected] ([email protected]) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Internet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, [email protected],
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
Aggregating Distributed Sensor Data for Network Intrusion Detection
Aggregating Distributed Sensor Data for Network Intrusion Detection JOHN C. McEACHEN, CHENG KAH WAI, and VONDA L. OLSAVSKY Department of Electrical and Computer Engineering Naval Postgraduate School Monterey,
Where Do You Tube? Uncovering YouTube Server Selection Strategy
Where Do You Tube? Uncovering YouTube Server Selection Strategy Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang University of Minnesota- Twin Cities Abstract YouTube is one of the most popular video sharing
TLP WHITE. Denial of service attacks: what you need to know
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
Network Monitoring Using Traffic Dispersion Graphs (TDGs)
Network Monitoring Using Traffic Dispersion Graphs (TDGs) Marios Iliofotou Joint work with: Prashanth Pappu (Cisco), Michalis Faloutsos (UCR), M. Mitzenmacher (Harvard), Sumeet Singh(Cisco) and George
Strategic Online Advertising: Modeling Internet User Behavior with
2 Strategic Online Advertising: Modeling Internet User Behavior with Patrick Johnston, Nicholas Kristoff, Heather McGinness, Phuong Vu, Nathaniel Wong, Jason Wright with William T. Scherer and Matthew
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Analysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković [email protected] Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
Packet-Marking Scheme for DDoS Attack Prevention
Abstract Packet-Marking Scheme for DDoS Attack Prevention K. Stefanidis and D. N. Serpanos {stefanid, serpanos}@ee.upatras.gr Electrical and Computer Engineering Department University of Patras Patras,
Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS
Classification: TLP-GREEN RISK LEVEL: MEDIUM Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS Release Date: 6.1.16 1.0 / OVERVIEW / Akamai SIRT is investigating a new DDoS reflection
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques
Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques Subhashree K 1, Prakash P S 2 1 Student, Kongu Engineering College, Perundurai, Erode 2 Assistant Professor,
