A COLLABORATIVE AND SCALABLE APPROACH FOR IDENTIFYING PROACTIVE FLOODING DDOS ATTACKS



Similar documents
Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System

Detection and Controlling of DDoS Attacks by a Collaborative Protection Network

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

ACHIEVING HIGHER NETWORK SECURITY BY PREVENTING DDOS ATTACK USING HONEYPOT

DISTRIBUTED denial-of-service (DDoS) attacks still constitute

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Detection and Mitigation of DDOS Attacks By Circular IPS Protection Network

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Keywords Attack model, DDoS, Host Scan, Port Scan

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

Survey on DDoS Attack Detection and Prevention in Cloud

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

2. Design. 2.1 Secure Overlay Services (SOS) IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.

Distributed Denial of Service (DDoS)

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

CHAPTER 1 INTRODUCTION

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback

Firewalls and Intrusion Detection

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

Detecting Constant Low-Frequency Appilication Layer Ddos Attacks Using Collaborative Algorithms B. Aravind, (M.Tech) CSE Dept, CMRTC, Hyderabad

Malice Aforethought [D]DoS on Today's Internet

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Denial of Service Attacks and Resilient Overlay Networks

Index Terms: DDOS, Flash Crowds, Flow Correlation Coefficient, Packet Arrival Patterns, Information Distance, Probability Metrics.

Survey on DDoS Attack in Cloud Environment

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Efficient Detection of Ddos Attacks by Entropy Variation

DDoS Counter Measures Based on Snort s detection system

Detection of Distributed Denial of Service Attack with Hadoop on Live Network

Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

FLOW BASED MULTI FEATURE INFERENCE MODEL FOR DETECTION OF DDOS ATTACKS IN NETWORK IMMUNE SYSTEM

Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

Network Bandwidth Denial of Service (DoS)

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

SECURING APACHE : DOS & DDOS ATTACKS - I

CS 356 Lecture 16 Denial of Service. Spring 2013

DETECTION AND PREVENTION OF LOW AND HIGH RATE FLOODING DDOS ATTACKS

Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

DoS: Attack and Defense

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Application of Netflow logs in Analysis and Detection of DDoS Attacks

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme

Second-generation (GenII) honeypots

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

Analysis of IP Spoofed DDoS Attack by Cryptography

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

Two State Intrusion Detection System Against DDos Attack in Wireless Network

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Conclusions and Future Directions

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

A Brief Discussion of Network Denial of Service Attacks. by Eben Schaeffer SE 4C03 Winter 2004 Last Revised: Thursday, March 31

How To Protect A Dns Authority Server From A Flood Attack

Denial of Service Attacks, What They are and How to Combat Them

The flow back tracing and DDoS defense mechanism of the TWAREN defender cloud

Comparing Two Models of Distributed Denial of Service (DDoS) Defences

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

A Novel Packet Marketing Method in DDoS Attack Detection

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Should the IETF do anything about DDoS attacks? Mark Handley

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

DDoS Protection Technology White Paper

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Complete Protection against Evolving DDoS Threats

How To Block A Ddos Attack On A Network With A Firewall

DDoS Attack Trends and Countermeasures A Information Theoretical Metric Based Approach

Low-rate TCP-targeted Denial of Service Attack Defense

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network

An Anomaly-based Intrusion Detection Architecture to Secure Wireless Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

PROFESSIONAL SECURITY SYSTEMS

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Transcription:

A COLLABORATIVE AND SCALABLE APPROACH FOR IDENTIFYING PROACTIVE FLOODING DDOS ATTACKS 1 ALGUNOORI BABU, 2 Y.KALYAN CHAKRAVARTI 1 M.Tech Student, Department of CSE, CMR College of Engineering & Technology, Hyderabad, Telangana, India. 2 Assistant Professor, Department of CSE, CMR College of Engineering & Technology, Hyderabad, Telangana, India. ABSTRACT Usually we transform information through network; there are so many types of networks such as distributed network, hybrid network and so on. During data transformation via internet, one of the problems is Distributed Denial of service (DDOS). This paper is to detect and overcome this problem. There are so many network algorithm, this firecol project is using bot-net based algorithm. In this project we implement virtual protection ring for overcome this problem. We address the problem of DDoS attacks and present the theoretical foundation, architecture, and algorithms of FireCol. The core of FireCol is composed of intrusion prevention systems (IPSs) located at the Internet service providers (ISPs) level. The IPSs form virtual protection rings around the hosts to defend and collaborate by exchanging selected traffic information. The evaluation of this work using extensive simulations and a real dataset is presented, showing its effectiveness and low overhead, as well as its support for incremental deployment in real networks. As an enhancement to this work the controlling of DDoS attacks are also included by constructing Inter Domain Packet Filters protect end-users as well as the expensive network infrastructure resources. Here, address the problem of DDoS attacks and present the theoretical foundation, architecture, and algorithms of detecting DDoS attacks. The core of this work is composed of intrusion prevention systems. Keywords Intrusion Prevention Systems, Identifying, Virtual Protection Rings, Proactive, Internet Service Providers, Mitigation I INTRODUCTION Now a day s providing security to the network has become a compulsory for the survival of the many entities that rely on their web presence. Protection against network attacks may be a necessary to remain in today s international market, thus Denial of Service Attacks (DOS) are thought of one in all the most threat against laptop networks. There are two aims for DDoS attacks. The primary is to consume the resources of the host and second is to consume the information measure of the network. Normally an enormous set of machines are accustomed launch a Distributed Denial of Service (DDOS) attack against a definite server or set of servers. The attack, originating from totally different sources, is extremely onerous to observe via any single border firewall or IDS as every device has solely an area read. Besides, attackers try and generate packets that seem like traditional traffic. On the opposite hand, protective the server at the shut neighborhood of its network is additionally inefficient as a result of it becomes overwhelming for one device to perform all the packets classification of the massive targeted quantity of traffic that it receives. Another traffic

sort referred to as a flash crowd is practiced once several legitimate users begin to access one explicit website at constant time. The impact of DDOS attacks will vary from minor inconvenience to users of an {online} website to serious monetary losses for corporations that admit their online availableness to try to business. DDOS attack defense the matter in terms of attack detection and packet filtering and addressing a number of the technical challenges exhibit by those tasks. Most up-to-date works aim at countering DDOS attacks by fighting the underlying vector that's sometimes the employment of bot-nets. The master will launch synchronized attacks by causing orders to the bots via a Command & management channel. To avoid the difficulty on the detection of DDOS attacks and intrinsically not their underlying vectors. Non-distributed denial-of-service attacks sometimes exploit vulnerability by causing few rigorously solid packets to disrupt a service. DDOS attacks are chiefly used for flooding a specific victim with huge traffic as highlighted. Network directors expect the analysis community to produce helpful techniques for sleuthing and mitigating these issues however up to now their weapons ar spoofing interference techniques. The initial aim of the web was to produce an open and scalable network among analysis and academic communities. With the rapid climb of the web over the past decade, the quantity of attacks on the web has conjointly accumulated chop-chop. The aim of a information measure attack is to consume crucial resources in a very network service. The assaulter will stop legitimate users from accessing the service. A single intrusion prevention system (IPS) or intrusion detection system (IDS) will hardly detect such DDoS attacks, unless they're set terribly near the victim. However, even therein latter case, the IDS/IPS could crash as a result of it must subsume an awesome volume of packets (some flooding attacks reach 10 a hundred GB/s). Additionally, permitting such large traffic to transit through the web and solely detect/block it at the host IDS/IPS could severely strain net resources. Therefore a collaborated system is needed that may empower the one host based mostly detection associated block procedures for an economical hindrance of DDoS. To beat such issues, a replacement cooperative system known as FireCol was projected that detects flooding DDoS attacks as way as doable from the victim host and as shut as doable to the attack source(s) at internet service provider (ISP) level. FireCol depends on a distributed design composed of multiple ISPs forming overlay networks of protection rings around signed customers. The virtual rings use horizontal communication once the degree of a possible attack is high. During this means, the threat is measured supported the traffic information measure directed to the client compared to the utmost information measure it supports. FireCol elements Packet Processor Metrics Manager Selection Manager Score Manager Collaboration Manager II RELATED WORK High information measure DDoS attacks consume additional resources with ISP level in DDOs attacks to sleek degradation of network and being undetectable. Most range of detection schemes was projected for current demand to detection of DDoS attacks. We have a tendency to propose earlier technique i.e. warning rate by varied tolerance factors in real time. During this technique we have a tendency to describe the simulation results victimization some NS-2 simulations techniques gift in networks. This method main advantage is that variable rate attack detection and minimum false alarms. However False alarms have important leads to detection of DDOS attacks. We have a tendency to introduce the network underneath provisioning in cloud infrastructure for police investigation and avoiding new type of DDOS attacks. The higher than comparison techniques square measure worked for detection of DDOS attacks. The first goal of AN attack is to deny in Victim s access especially resources. We offer the framework police investigation the attack and dropping the snooped attacks. It ll forge the attack in informatics packet however we have a tendency to can t management

the hop count therein attack. This method will be reduced by characteristic the attackers in learning state. Finally we have a tendency to describe the climbable resolution for detection for DDOS attacks. It s performed as near attack sources as attainable, providing a protection to signed customers and saving valuable network resources. Experiments showed sensible performance and lustiness of FireCol and highlighted sensible practices for its configuration. However FireCol was designed in single IPS Rule structure. During this paper we have a tendency to introduce the SNORT rule structure for original ASCII text file is offered to anyone at no modification. Snort based mostly DoS detection system will be a true time economical and possible implementation that may counter varied DoS attack forms. III PROBLEM DEFINITION DDOS attack is that the main downside altogether accidental state of affairs i.e. in MANAT and likewise as in wireless device networks. Within the Paper with reference no. Has Associate in nursing intrusion detection system in wireless device network that uses the anomaly intrusion detection system during which IDS uses 2 intrusion detection parameters, packet reception rate (PRR) and bury point (IAT). However solely these 2 parameters aren't utterly comfortable for intrusion detection in wireless device network and likewise as in MANET. If we have a tendency to additionally add alternative parameters into it to create it works additional accurately. Therefore in our proposal we have a tendency to use completely different intrusion detection parameters in mobile accidental networks. we have a tendency to assume that a mobile accidental network contains 2 or over 2 mobile devices that are communicate from one another through intermediate nodes, every node contain routing table, in our proposal we have a tendency to use AODV routing protocol altogether traditional module attack module and IDS (intrusion detection system) for hindrance through attack. During this paper we have a tendency to simulate the 3 completely different condition results traditional time, Attack time and IDS module time through NS-2 machine. Criteria for Attack Detection Here we have a tendency to use 13 mobile nodes and simulate through 3 completely different criteria traditional case, DDOS attack case and when IDS intrusion detection case. Traditional Case We have a tendency to set range of sender and receiver nodes and transport layer mechanism as communications protocol and UDP with routing protocol as AODV (ad-hoc on demand distance vector) routing. when setting all parameter simulate the result through our machine. Attack Case In Attack module we have a tendency to produce one node as aggressor node whose set the some parameter like scan port, scan time, infection rate, and infection parameter, aggressor node send inquiring packet to any or all alternative neighbour node whose belongs to in radio vary, if any node as week node with near or within the radio vary on aggressor node consider communication through aggressor node, in order that inquiring packet receive by the attack node and infect through infection, when infection this infected node launch the DDOS (distributed denial of service) attack and infect to next alternative node that case our overall network has been infected. IDS Case In IDS (Intrusion detection system) we set one node as IDS node, that node watch the all radio range mobile nodes if any abnormal behaviour comes to our network, first check the symptoms of the attack and find out the attacker node, after finding attacker node, IDS block the attacker node and remove from the DDOS attack. In our simulation result we performed some analysis in terms of routing load, UDP

analysis, TCP congestion window, Throughput Analysis and overall summery. IV PROPOSED WORK Fig. 1. Horizontal and vertical communication in FireCol A. Ring-Based overlay Protection: The system maintains virtual rings or shields of protection around registered customers. A hoop consists of a collection of IPSs that square measure at a similar distance (number of hops) from the client.each IPS instance analyzes mass traffic at intervals a configurable detection window. The metrics manager computes the frequencies and also the entropies of every rule. A rule describes a particular traffic instance to observe and is basically a traffic filter, which might be supported IP addresses or ports. Following every detection window, the choice manager measures the deviation of this traffic profile from the hold on ones, selects out of profile rules, and so forwards them to the score manager. Employing a multidimensional language, the score manager assigns a score to every designated rule supported the frequencies, the entropies, and also the scores received from upstream IPSs (vertical collaboration/communication). A threshold, a quite low score is marked as a coffee potential attack and is communicated to the downstream IPS that may use to reckon its own score. A quite high score on the opposite hand is marked as high potential attack and triggers ring-level (horizontal) Communication (Fig. 2) so as to substantiate or dismiss the attack supported the computation of the particular packet rate crossing the ring surpasses the identified, or evaluated, client capability. As is noticed, this detection mechanism inherently generates no false positives since every potential attack is checked. However, since the complete traffic can't be probably monitored, we have a tendency to promote the usage of multiple levels associate degreed cooperative filtering delineated antecedently for an economical choice of rules, so traffic, on the method. In brief, to save lots of resources, the collaboration manager is merely invoked for the few designated candidate rules supported resourcefriendly metrics. B. Subscription Protocol: This system protects subscribers (i.e., potential victims) supported outlined rules. A rule matches a pattern of IP packets. Generally, this corresponds to associate degree IP sub-network or one IP address. However, the rule definition will embody the other monitorable info that may be monitored, like the protocols or the ports used. This method is another price service to those customers subscribes victimization the protocol. The protocol uses a sure server of the ISP that problems tokens. Once a client subscribes for the system protection service, the sure server adds associate degree entry with the subscribing rule together with its subscription amount (TTL) and also the supported capability. The server then problems sporadically a corresponding token to the client with a TTL and a singular ID signed victimization its non-public key. All communications between subscribers and also the server square measure secured a victimization private/public key coding theme. The ring level of a system-enabled router (IPS) is frequently updated supported the degree of stability of IP routing. This can be done employing a 2 part method. First, the router sends a

message RMsg to the protected client containing a counter initialized to zero. The counter is incremented whenever it passes through a FireCol-enabled router. The client (or firstlevel FireCol router) then replies to the initiating router with the worth of its ring level. This procedure is optimized through aggregation once many routers square measure requesting a ring-level update. V FireCol SYSTEM FireCol maintains the following frequency and entropy-based metrics. Frequency: The frequency fi is the proportion of packets matching rules ri within a detection window. Where Fi=number of packets matched by rule ri by detection window Entropy: The entropy measures the uniformity of distribution of rule frequencies. If all frequencies are, equal then the entropy is maximal and the more skewed the frequencies. H = -E[logn fi] = - fi logn(fi) Relative Entropy: The relative entropy metric measures the dissimilarity between two distributions. If the distributions are equivalent then the relative entropy are zero and the more deviant the distributions. Firecol Attack Detection Algorithm The collaboration manager computes the corresponding packet rate using rule frequencies and the overall bandwidth consumed during the last detection window. An alert is raised if the rate is higher than the rule capacity. Else, the computed rate is sent to the next IPS on the ring. Algorithm: 1 if bi ^(IPS_id null) then 2: if IPS_id = = myid then 3: bi = false; 4: return 5: else 6: ratei ratei+fi 7: if ratei > capi then 8: bi = false; 9: raise DDOS alert; 10: return 11: else 12: next IPS check Rule (IPS_id,i,rate,capi) 13: endif 14: endif 15: else 16: bi = true 17: next IPS. check Rule(my ID,I,0,capi) 18: end If it first checks if it was the initiator when an IPS receives a request to calculate the aggregate packet rate for a given rule. It deduces that the request has already made the round of the ring, and hence there is no potential attack. Else, it calculates the new rate by adding in its own rate and checking if the maximum capacity is reached, in which case an alert is raised. Algorithm 1 shows the details of this procedure. Rate computation can be performed based on the number of packets per second (pps) or bytes per second (bps). The method is more suitable for detecting flooding DDoS attacks having a small packet pattern. Bytes-based method is better for detecting flooding attacks with large packet payloads. While FireCol already gives us an effective solution to the high rate attacks, and a system needs to be designed that could successfully detect LDoS attacks as well. The high rate DDoS attack can be detected by computing the entropy and frequency values of the incoming packets. The incoming bandwidth level exceeds the ISP allocated bandwidth. The ring level protection of FireCol is assigned only to the subscribed users of that particular ISP. Intruders now resort to Low Rate DDoS attacks, as there are not many algorithms that successfully prevent it. Successful DDoS prevention algorithm must be

equipped to prevent both High Rate and Low Rate DDoS attacks. Hence, it is always necessary to be one-step ahead of the intruders and our system promises to limit the DDoS attacks up to a maximum extent. There are Intrusion Prevention Systems deployed around the user in a ring like structure that has H-IPS in the outer ring that primarily focuses on preventing High Rate attacks. If the incoming bandwidth exceeds the allocated limit then it is understood that the system is under attack and the incoming packet will be immediately dropped. Some Low Rate attacks can pass through the system when this ensures that the High Rate attacks are successfully blocked. VI EXPERIMENTAL RESULTS Firecol server CONCLUSION As a result this collaborative system is more efficient to detect the Distributed Denial of Service attack compared to single intrusion system. Belief scores area unit shared among a ring-based overlay network of IPSs. It s performed as near attack sources as potential, providing a protection to signed customers and saving valuable network resources. Experiments showed smart performance and robustness of system and highlighted smart practices for its configuration. Also, the analysis of system incontestible its light process in addition as communication overhead. Being offered as one more price service to customers, the accounting for system is thus expedited, that represents an honest incentive for its preparation by ISPs. As a future work, conceive to extend this method to support totally different IPS rule structures. Experiments showed good performance and providing a protection to subscribed customers providing valuable network resources. REFERENCE [1] M. Dischinger, A. Mislove, A. Haeberlen, and K. P. Gummadi, Detecting bittorrent blocking, in Proc. ACM SIGCOMM Conf. Internet Meas., 2008, pp. 3 8. Click Frequency chart. Show the score rule frequency [2] Y. Zhang, Z. M. Mao, and M. Zhang, Detecting traffic differentiation in backbone ISPs with NetPolice, in Proc. ACM SIGCOMM Conf. Internet Meas., 2009, pp. 103 115. [3] G. Shafer, A Mathematical Theory of Evidence. Princeton, NJ: Princeton Univ. Press, 1976. [4] T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling, Measurements and mitigation of peer-topeerbased botnets: A case study on storm worm, in Proc. USENIX LEET, 2008, Article no. 9. [5] J. Françcois, A. El Atawy, E. Al Shaer, and R. Boutaba, A collaborative approach for proactive detection of

distributed denial of service attacks, in Proc. IEEE MonAM, Toulouse, France, 2007, vol. 11. [6] A. Feldmann, O. Maennel, Z. M. Mao, A. Berger, and B. Maggs, Locating Internet routing instabilities, Comput. Commun. Rev., vol. 34,no. 4, pp. 205 218, 2004. [7] A. Basu and J. Riecke, Stability issues in OSPF routing, in Proc.ACM SIGCOMM, 2001, pp. 225 236. [8] V. Paxson, End-to-end routing behavior in the Internet, IEEE/ACM Trans. Netw., vol. 5, no. 5, pp. 601 615, Oct. 1997. [9] K. Xu, Z.-L. Zhang, and S. Bhattacharyya, Internet traffic behavior profiling for network security monitoring, IEEE/ACM Trans. Netw.vol. 16, no. 6, pp. 1241 1252, Dec. 2008. [10] Z. Zhang, M. Zhang, A. Greenberg, Y. C. Hu, R. Mahajan, and B. Christian, Optimizing cost and performance in online service provider networks, in Proc. USENIX NSDI, 2010, p. 3.