Index Terms: DDOS, Flash Crowds, Flow Correlation Coefficient, Packet Arrival Patterns, Information Distance, Probability Metrics.



Similar documents
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback

Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds

Discriminating DDoS Attack Traffic from Flash Crowd through Packet Arrival Patterns

Detection and Tracing Technique for DDoS Attacks from Flash Crowd

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme

Discriminating DDoS Attack traffic from Flash Crowds on Internet Threat Monitors (ITM) Using Entropy variations

Survey on DDoS Attack Detection and Prevention in Cloud

Keywords Attack model, DDoS, Host Scan, Port Scan

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

DDoS Attack Trends and Countermeasures A Information Theoretical Metric Based Approach

Survey on DDoS Attack in Cloud Environment

How To Classify A Dnet Attack

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System

Complete Protection against Evolving DDoS Threats

A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack

Denial of Service Attacks, What They are and How to Combat Them

DoS and DDoS Attack Types and Preventions

A HYBRID APPROACH TO COUNTER APPLICATION LAYER DDOS ATTACKS

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Modern Denial of Service Protection

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Symptoms Based Detection and Removal of Bot Processes

TLP WHITE. Denial of service attacks: what you need to know

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

CS 356 Lecture 16 Denial of Service. Spring 2013


Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

SECURING APACHE : DOS & DDOS ATTACKS - I

Second-generation (GenII) honeypots

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

International Journal of Advance Research in Computer Science and Management Studies

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Denial of Service (DoS)

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic

Radware s Behavioral Server Cracking Protection

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Abstract. Introduction. Section I. What is Denial of Service Attack?

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

A Critical Investigation of Botnet

Taxonomy of Intrusion Detection System

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Network attack and defense

Detection of Distributed Denial of Service Attack with Hadoop on Live Network

Threat Events: Software Attacks (cont.)

Detecting Constant Low-Frequency Appilication Layer Ddos Attacks Using Collaborative Algorithms B. Aravind, (M.Tech) CSE Dept, CMRTC, Hyderabad

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Can We Beat DDoS Attacks in Clouds?

Firewalls and Intrusion Detection

DDoS Protection Technology White Paper

Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks

Secure Software Programming and Vulnerability Analysis

Yahoo Attack. Is DDoS a Real Problem?

Detection and Controlling of DDoS Attacks by a Collaborative Protection Network

Evaluation of Flow and Average Entropy Based Detection Mechanism for DDoS Attacks using NS-2

Design and Implementation of a System for Denial of Service Attack Detection Based on Multivariate Correlation Analysis

Gaurav Gupta CMSC 681

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

How To Stop A Ddos Attack On A Website From Being Successful

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS

The Hillstone and Trend Micro Joint Solution

Multivariate Correlation Analysis for Denial-of-Service Attack Detection.

Denial of Service (DoS) Technical Primer

Seminar Computer Security

co Characterizing and Tracing Packet Floods Using Cisco R

Denial of Service. Tom Chen SMU

Distributed Denial of Service Attacks

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

DoS: Attack and Defense

Transcription:

Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Techniques to Differentiate DDOS Attacks from Flash Crowd Ms P.Rajani Reddy 1, Mr R.Siva 2, Ms C.Malathi 3 1 Dept. Of Computer Science & Engg., 2 Asst. Professor, 3 Dept. Of Computer Science & Engg. Annamacharya Inst. of Technology & Sciences, Tirupati, India Sree Vidyanikethan Engg. College, Tirupati, India Abstract: Flash crowds and DDOS attacks have very similar properties in terms of internet traffic. DDOS attacks are malicious requests that does not need to be handled by a server and flash crowd consist of legitimate requests, the server has responsibility to handle as many requests as possible during a flash event. So the attack flows are generated by the same pre built programs (attack tools), whereas the flash crowds come from the randomly distributed users all over the Internet. So in this paper, we aim to differentiate DDOS attack flows from flash crowds based on the following methods: Flow Correlation Coefficient, Packet Arrival Patterns, Information Distance and Probability Metrics. Index Terms: DDOS, Flash Crowds, Flow Correlation Coefficient, Packet Arrival Patterns, Information Distance, Probability Metrics. I. INTRODUCTION A DOS attack is one in which the goal of the attacker is to gain unauthorized privileged access, but it can be just as malicious. The DOS concept is easily applied to the networked world. The DOS is disruption and inconvenience. A denial of service, or DOS, is a category of attack in the security engineering. Routers and servers can handle a finite amount of traffic at any given time based on factors such as hardware performance, memory and bandwidth. If this limit or rate is increased, new requests will be rejected. As a result, genuine traffic will be ignored and the object's users will be denied access. A DDOS can be thought of as an improved form of a traditional DOS attack. Instead of one intruder flooding a target with traffic, numerous machines are used in a "master-slave", multi-tiered configuration. The coordinated attack was designed to disable several of the Internet's root name servers. The attack was sophisticated and complex, known as a distributed denial of service (DDOS) prevents genuine traffic from reaching major sites for several hours. A cracker breaks into a large number of Internet-connected computers (often using automated software known as an autorooter) and installs the DDOS software package (of which there are several changes). The DDOS software allows the intruder to remotely control the compromised computer, thereby making it a "slave". From a "master" device, the attacker can inform the slaves of a target and direct the attack. Thousands of machines can be controlled by a single point of contact. Start time, stop time, target address and attack type all can be communicated to slave computers from the master machine via the Internet. When used for one purpose, a single machine can produce several megabytes of traffic. Several hundreds of machines can generate gigabytes of traffic. Yahoo, ebay, Buy.com, and CNN were but a few major sites who were inaccessible to their customers for certain period of time. A flash event (FE) is a large surge in traffic to a particular Web site causing a dramatic increase in server load and putting severe strain on the network links leading to the server, which results in substantial increase in packet loss and congestion. Flash Events represent legitimate traffic to a website. This means the website wants to service these requests as well as possible, while DOS attacks are unwanted and should not be serviced, instead they should be ignored or controlled. II. Discriminating DDOS Attacks from Flash Crowds Using Flow Correlation Coefficient Distributed Denial of Service (DDOS) attack is threat to the Internet and botnets are usually the engines. Sophisticated botmasters attempt to disable detectors by reducing the traffic patterns of flash crowds. In this, the size and organization of current botnets and the current attack flows are usually more similar to each other compared to the flows of flash crowds. So we present a flow similarity-based approach to discriminate DDOS attacks from flash crowds, which remains a burning problem to date. Distributed Denial of Service (DDOS) attacks pose a critical threat to the Internet. Individual attacks are becoming stronger and more sophisticated. Motivated by huge financial rewards, such as renting out their botnets for attacks or collecting sensitive information for malicious purposes, hackers are encouraged to organize botnets to commit these crimes. To sustain their botnets, botmasters take advantage of various antiforensic techniques to disguise their traces, such as code obfuscation, memory encryption, fresh code pushing for resurrection, peer-to-peer implementation technology or flash crowd mimicking. Flash crowds are unexpected, but genuine, sudden surges of access to a server, such as breaking news. One powerful strategy for intruders is to simulate the traffic patterns of flash crowds to fly under the radar. This is referred to as a flash crowd attack. The current most popular defence mechanism against flash crowd attack is the use of graphical 2013, IJARCSSE All Rights Reserved Page 295

puzzles to differentiate between bots and humans. This method involves human responses and can be annoying to users. The behavior-based discriminating methods work well at the application layer. Bots are caught by honeypots and analyzed thoroughly via inverse engineering techniques. Botnet infiltrations are further implemented to collect first-hand information about their activities and implemented a peer-to-peer-based botnet. The following facts concerning the current botnets. 1. The attack tools are prebuilt programs they are usually the same for one botnet. A botmaster issues a command to all bots in his botnet to start one attack session. 2. The attack flows that are at the victim end are an aggregation of many original attack flows, the aggregated attack flows share a similar standard deviation as an original attack flow, and the flow standard deviation is usually smaller than that of genuine flash crowd flows. The reason for phenomenon is that the number of live bots of a current botnet is far less than the number of concurrent legitimate users of a flash crowd. However, we observed that the number of concurrent users of the flash crowds of World Cup 98 is at the hundreds of thousands level. Therefore, in order to launch a flash crowd attack, a botmaster has to force his live bots to generate many more attack packets, e.g., web page requests, than that of a legitimate user. As a result, the aggregated attack flow possesses a small standard deviation compared with that of a flash crowd, which results in the phenomenon we see in Fig. 1. Based on observation, we found that the similarity among the current DDOS attack flows is higher than that of a flash crowd. Therefore, we propose a flash crowd attack detection method using the flow correlation coefficient. We aim to protect potential victims (e.g., web servers, mail servers) from flash crowd attacks within a community network. A community or ISP network often operates with the same Internet service provider domain or the virtual network of different entities in which are all cooperating at one another. The community network benefits the defence of DDOS attacks in a wider range and in a cooperative way. So the established model for DDOS attacks detection in a community network where the potential victim is situated. Fig1: The difference between an aggregated attack traffic and a flash crowd traffic under the current botnet size and organization. III. Discriminating DDOS Attack Traffic from Flash Crowd through Packet Arrival Patterns Current DDOS attacks are carried out by attack tools, worms and botnets using different packet-transmission strategies and various types of attack packets to beat defense systems. Those problems lead to defense systems requiring various detection methods in order to identify attacks. DDOS attacks can mix their traffics during flash crowds. By doing so, the complex defense system cannot detect the attack traffic in time. So in this paper, a behavior based detection that can discriminate DDOS attack traffic from traffic generated by real users is proposed. By using Pearson s correlation coefficient, comparable detection methods can extract the repeatable features of the packet arrivals. We consider the situation where a server is overwhelmed by flash crowd flows and/or DDOS attacks as illustrated in Fig.2 A server connects to the Internet and provides a service to public Internet users. Legitimate users do not harm the server or the service. The busy server could suffer a flash crowd (FC) event which is observed as a sudden high demand in service requests from Internet users. A flash crowd could overwhelm a server and create a DOS condition which results in either a delay of response or a complete crash. DDOS attack is, harmful than a flash crowd. Zombie machines (or bots) are compromised and controlled by attackers. The (botnet) attacks could be synchronized to overwhelm the victim in a specific period of time. The situation could be worse when a flash crowd merges with a DDOS attack. This accelerates the DOS condition to the server. The behavior of the bot can be detected by the victim s server by observing the predictable arrival rate. 2013, IJARCSSE All Rights Reserved Page 296

Fig2: Accumulative arrival rate Fig 3. Experiment on sample dataset 1 (CID55) with method 1, (a) packet arrival plot, and (b) correlation from different k=20. Fig4. Experiment on generated dataset 1 (CID55) with method 2, (a)packet arrival plot, and (b) correlation with k=10. Fig5. Experiment on sample dataset 2 (M17060) with method 1, (a) packet arrival plot, and (b) correlation from different k=20. 2013, IJARCSSE All Rights Reserved Page 297

Fig 6. Experiment on sample dataset 2 (M17060) with method 2, (a) packet arrival plot, and (b) correlation with k=10.bg IV. Discriminating DDOS Flows from Flash Crowds Using Information Distance Discriminating DDOS flooding attacks from flash Crowds pose a challenge for the network security community. Due to the vulnerability of the original design of the Internet, attackers can easily mimic the patterns of legitimate network traffic to fly under the radar. So in this, DDOS attack flows from flash crowds and motivated by the following fact: the attack flows are generated by the same prebuilt program (attack tools), however, flash crowds come from randomly distributed users all over the Internet. Therefore, the flow similarity among DDOS attack flows is much stronger than that among flash crowds. We employ abstract distance metrics, the Jeffrey distance, the Sibson distance, and the Hellinger distance to measure the similarity among flows to achieve our goal. We compared the three metrics and found that the Sibson distance is the most suitable. We Then the algorithm to the real datasets and the results indicate that the proposed algorithm can differentiate them with an accuracy around 65%. Fig 7. Similarity measure with the Hellinger distance time. crowds. The proposed strategy can differentiate DDoS attack flows and flash crowds more than 65% (13 out of 20) of the The Sibson distance is best metric among the three metrics for discriminating DDOS attack flows from flash Fig8. Similarity measure with the Hellinger distance 2013, IJARCSSE All Rights Reserved Page 298

Fig 9. Similarity measure with the Jeffrey distance Fig10. Similarity measure with the Sibson distance V. Distinguishing DDOS Attacks from Flash Crowds Using Probability Metrics Both Flash crowds and DDOS (Distributed Denial -of-service) attacks have very similar properties in terms of internet traffic, however Flash crowds are legitimate flows and DDOS attacks are illegitimate flows, and DDOS attacks have been a serious threat to internet security and stability. In this paper we propose a set of novel methods using probability metrics to distinguish DDOS attacks from Flash crowds effectively, and our simulations show that the proposed methods work well. In particular, these methods can not only distinguish DDOS attacks from Flash crowds clearly, but also can distinguish the anomaly flow being DDOS attacks flow or being Flash crowd flow from Normal network flow effectively. Furthermore, we show our proposed hybrid probability metrics can greatly reduce both false positive and false negative rates in detection. VI.Conclusion In this paper we surveyed on four different techniques to differentiate DDOS attack from flash crowd. Among the techniques Discriminating DDOS Attacks from Flash Crowd Using Flow Correlation Coefficient shows better results. References [1] Shui Yu, Weijia Jia, Song Guo, Yong Xiang, and Feilong Tang Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 6, JUNE 2012. [2] Theerasak Thapngam, Shui Yu, Wanlei Zhou and Gleb Beliakov Discriminating DDoS Attack Traffic from Flash Crowd through Packet Arrival Patterns The First International Workshop on Security in Computers, Networking and Communications pno 969-974. [3] Shui Yu, Theerasak Thapngam, Jianwen Liu, Su Wei and Wanlei Zhou Discriminating DDoS Flows from Flash Crowds Using Information Distance International Conference on Network and System Security pno 351-356.2009. [4] Ke Li, Wanlei Zhou, Ping Li, Jing Hai and Jianwen Liu Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics Third International Conference on Network and System Security pno: 9-17.2009. 2013, IJARCSSE All Rights Reserved Page 299