Anda di halaman 1dari 10

AN EFFECTIVE DEFENSE CUM PREVENTION OF DDoS ATTACKS

IN ACTIVE NETWORKS USING ATTRIBUTE TREES

P.Jayashree1 , Dr.K.S.Easwarakumar2
1
Department of Information Technology, Anna University, MIT, Chennai,India
2
Department of Computer Science and Engineering, Anna University, CEG, Chennai,India
pjshree@annauniv.edu

ABSTRACT
With the development and deployment of increasing internet services due to
emerging technologies to meet the ever growing demands of the web users, the
necessity to make these services available in also equally demanding. But web has
become a necessary iniquity due to cyber attacks that are springing in abundance
everyday. One of the most threatening attacks is the denial of service attacks
originated from a single or multiple sources to make the legitimate users starve
from the requested services. Many solutions have been proposed in the literature to
defend against such attacks with each one having its own strength and weakness.
In this paper an optimal datamining based defense cum protection mechanism, that
identifies and uses the candidate packet attributes which can demark the attack
packets from legitimate traffic more accurately, is devised as a complement to
existing solutions and tested for its detection efficiency using ANTS, an active
network test bed.

Keywords: network security,denial of service attack, data mining, acive network .

1 INTRODUCTION framework where network elements are


programmable. This differs from traditional network
With the advent of internet technology, the in that all the network components are active in
number and variety of services on the web are nature [3],[4].Like end hosts, the routers are capable
tremendously increasing. Free and open accessibility of performing any customized computation on the
of these resources also give room for security packets flowing through them as specified by user or
attacks, imposing the need for adopting security application.
measures for the network. One of the serious security Commonly two approaches exist to bring
threats from users’ view point is the denial of service activity to network nodes namely discrete approach
(DoS) attacks. The damaging effect of such attacks and integrated approach. The discrete approach or
can further be intensified through a set of attack programmable node approach allows programs to be
sources distributed over a network domain leading to injected into the active programmable nodes out of
distributed denial of service attacks(DDoS).These band (i.e) separately from the data packets. The data
attacks are employed from a set of compromised packets carry information for the active nodes to
hosts for consuming computational and handle them. In integrated approach or encapsulation
communication resources rapidly [1]. approach the code to be executed is integrated into
Addressing denial of service problem is every packet of data called as capsule. When the data
important as there has been an increase in network arrives at the active node, it interprets the code and
attacks in recent times [2].Many solutions have been processes the data depending on code interpretation.
proposed in the literature for defending against such Each active node has a built in mechanism to load
attacks, each one having its own strength and the code, an execution environment to execute the
weakness. As the DDoS attacks primarily aim at code and a relatively permanent storage where the
flooding the network, depleting the bandwidth and capsules would retrieve or store information.
other resources rapidly, the same characteristics is Though active network increases the flexibility
made use of in devising the attack detection solution. and ease of deploying network applications, it also
In this paper a data mining based defense cum poses severe security threats. The presence of
prevention mechanism is proposed based on distrusted code that is executed on the network
analyzing the features of the network data packet components may be malicious in nature to damage
using efficient data structures and employing present the routers. Hence dealing with security is an
and traffic history details for the classification of important issue for these type of networks.
legitimate and attack traffic.
The solution is addressed for active network, a

Ubiquitous Computing and Communication Journal 1


1.1 Contributions solutions employ rate limiters to control and regulate
The proposed mechanism claims the following the traffic flow for attack mitigation as in [13][14].
contributions as a part of the effective solution to In [15], various congestion control techniques like
DDoS attacks. RED, CHOKE and pushback are used for mitigating
 A defense cum prevention solution is attacks. Most of the solutions basically adopt some
deployed at the source end perimeter analytical models or algebraic approach for the
routers and hence the network resources solution as discussed in [16],[17],[18],[19].
are saved from flooding attacks. The DWARD defense system is deployed at
 Effective mechanism is devised to source end and autonomously detect attacks at the
select packet attributes that act as origin. [20].Secure Overlay Services (SOS) [21]
candidates for classifying attack packets hides victims locations to safeguard against attacks.
from legitimate traffic. DefCOM (Defensive overlay Cooperative Mesh)
 The attributes are assigned varying [22] proposes a distributed, cooperative network of
weights evaluated based on their degree routers that respond effectively to DDoS attacks
of contribution to detect attacks. while making some guarantees of continued service
 The efficiency of attack detection for for legitimate clients. COSSACK [23] similarly
further prevention depends on the use forms a multicast group of defense nodes that are
of efficient and optimal data structures deployed at source and victim networks and
and information exchange between cooperate in filtering the attack and [24] defines a
perimeter routers. defense solution for active networks.

1.2 Paper Organization 2.2 Data Mining Solutions


The remainder of the paper is organized as Data mining is a powerful technology that
follows. Section 2 provides the preliminaries on enables retrieving relevant data from a huge volume
denial of service attack and the related works in the in data ware houses. There exists many data mining
literature. The proposed mechanism is discussed in tools that can predict future trends and behaviors,
section 3 and the design and implementation details facilitating proactive, knowledge driven decisions in
are provided in section 4 and 5. Results of the many domains. This potential and automated
simulation and analysis are reported in Section 6 and analysis offered by data mining along with past event
conclusions are drawn in section 7. analysis provides a retrospective basis for decision
support systems. Extracting relevant information
2 PRELIMINARIES from a huge data base in comparable time is a
promising alternative for earlier expert systems.
Denial of service was the top source of financial The main objective of going for mining the data
loss due to cyber crime. The DoS attack on DNS in data stores is to identify and extract some hidden
server last year lasted only an hour. Since DNS or indirectly documented information which may go
information is heavily cached and had the attack unnoticed otherwise and which may be necessary for
lasted longer, the Internet could have experienced generating good predictive information in expert
severe disruption. DDoS affects not only the target of systems and other decision making systems. The data
the attack but legitimate users of the target's services mining techniques that are commonly adopted are
are affected too. Observations and experiences using neural network, Decision trees, Near neighbor
tracking denial of service attacks over a period of method, support vector machines and association
time in the history serves as a base for better rule induction[25]. Listed below is the collection of
understanding to build novel solutions for the same. few recent works in attack detection using data
In this section a framework for classifying mining techniques.
defense strategies for denial of service attacks is Many data mining based approaches are
presented. Though many solutions are coming up, a discussed in the literature addressing the solution
sample of the most popular solutions employing using statistical, classification approaches and other
variety of defense methods are overviewed here. signal processing and pattern recognition techniques.
[25],[26] discussed a IDS model using historical data
2.1 Related Works analysis. Neural network based model is proposed in
Identifying IP address spoofing is an important [27] and genetic algorithm is used to model detection
task in any attack detection and ingress filters and system as in [28]. Different data mining techniques
egress filters and hop count filtering methods are are discussed and analyzed in [29] and [30] has
proposed in literature [5],[6],[7]. Various methods presented various intrusion detection approaches as
employ some form of packet marking to identify or summarized above.
trace down the attacks. Pushback mechanism Few commercial and many experimental
[8],Trace back methods [9],[10],[11] and (Pi) path products like EMERALD, ISOA(information
identification [12] are few of such methods. Few security office assistant), DIDS(Distributed IDS),

Ubiquitous Computing and Communication Journal 2


Kane secure, SNORT are also available. Each of future predictions of likely events, using the
these proposals has its own merit and provides knowledge of existing data collection, is found to be
techniques that can help address the DoS problem in an competitive alternative to many attack detection
different angles. No method has suggested a methods proposed. The attack traffic, modeled as an
complete solution to the attack so far. But it is vital array of trees, each of which stores and updates the
to have a more complete attack solution for data for a promising attribute of the packets for
comprehensive network security. In this paper efficient attack detection, is mined dynamically. The
another data mining based defense strategy to approach is similar to the random forest data
complement the list of existing techniques, with its classifier method [32],[33]. The application of
own strengths, is proposed. random forest, a collection of unpruned regression
trees to detect intrusions is proposed in [34]wherein
3 PROPOSED STRATEGY the detection mechanism using random forest
classification is deployed at home router of victim to
3.1 An Overview mine the static data set. Moreover the application of
The proposed detection cum prevention method random forests, collection of yes/no decision trees,
for DDoS attacks is based on statistical mining of the was used to classify data sets corresponding to
analyzed traffic data characteristic and behavior to misuse detection effectively. In the proposed defense
extract and order the packet features that decide the strategy, the trees are used as binary search trees
success of the detection system. The system is populated with attribute values to aid in effective
designed for active network domain and hence the detection of attack traffic.
deployment of the defense solution supports a
preventive mechanism for further attacks. Active 3.3 Defense Framework
networks allows all the network elements and hence The defense system is a two phase system with a
the routers to be programmable which makes the training phase and a detection phase. The boundary
deployment in the routers at ease. between the two phases is not strictly demarked
The DDoS attacks though aim at pinning down though the detection phase follows training phase, as
the hosts providing services to users on the network, the attribute trees learn to get their characteristic
the attack traffic depletes the network resources also features for the detection redefined periodically over
at a faster rate to make the entire network stumble their life time. This section provides an overview of
for its normal request and response activities. Hence the system architecture and conceptual outline of the
it is wise to deploy the defense solution at the source defense strategy adopted for attack detection, the
end so that attack traffic can be prevented from details of which are discussed in the next section.
entering the network once detected and thereafter the Denial of service attack traffic is modeled as a
attack packets get dropped at the network perimeter set of binary trees, each tree corresponds to an
itself. Identifying the source end routers ahead of the attribute of the attack traffic packet. Denial of service
attack severity is a basic requirement and the first attacks are primarily characterized by flooding type
hop routers in the network are identified through a of traffic from a single or a set of sources towards a
simple packet marking scheme as discussed in our particular destination host. The attack may be of
previous work [31]. One of the common either constant rate or varying rate flow of packets.
characteristics of DDoS attacks is the use of IP The solution should be able to handle both types
spoofing and ingress filter [5] is employed as the first effectively. Based on the characteristics of the attack
level of the solution phase to take care of IP spoofing. and from what is learnt from the previous works in
The packet attributes are collected and mined as an literature, the following attributes of the traffic are
array of attribute trees to extract the required the expected to be more suitable for traffic classification
information for traffic classification. The proposed to detect DoS and DDoS attacks namely Destination
scheme defines the methodology adopted by the address and port, Source address, Frequency of
system for an attempt to develop an effective packets per flow, Frequency variations in traffic flow,
detection strategy. Length of the packets per flow, Type of protocol
used in per flow traffic. These six attributes can well
3.2 Data Mining Approach represent both the packet as well as the traffic
The set of data mining tasks commonly used for characteristics that can be used for discriminating
any data retrieval operation are summarizing the data Dos attacks, when evaluated over different periods of
to pick up relevant and hidden data items, applying time.
some association rules to convert the data into The training phase is meant as a preprocessing
categorical set and applying some method of phase for the attack detection. The attributes
classification to categorize the data for future extracted from the packets of a training set of attack
prediction. This approach naturally pay way for its samples is represented using a set of trees which are
suitability in network intrusion detection applications. populated with the data. The trees are attributed by a
Data mining technique, with its power to make weight factor that defines the priority of the

Ubiquitous Computing and Communication Journal 3


attribute’s contribution in detecting the attack. actual network traffic are evaluated and assigned a
During the detection phase the packets from the

Training Phase

Attribute Tree
attack traffic packets attributes
Populator

attribute trees

Packet Elicitor
Tree Attributer

attack
attribute trees packets

Traffic Classifier
real traffic packets

normal
packets
Detection phase

Figure 1. System architecture

score point based on degree of relevance to attack corresponding to the various values taken by the
characteristics possessed by them. This information attribute. Each node Nj has two fields to signify the
is fed back to the set of attribute trees that are used attribute value (Vj) and the frequency (Fj). The tree
for classifying the traffic. This positive feed back is constructed dynamically as repeated insertion of
aids in fine tuning the classifier to more correctly nodes as and when a packet with that attribute
classify the traffic. The packets that score above a arrives. The set of trees for the deciding set of
predefined threshold value are stamped as attack attributes used for attack detection is represented as
packets and get dropped at the router and thereby in Eq.(1).
prevented from entering the network. The detection
mechanism outlined here is depicted in the fig. 1. SA  Ai , i is an integer
4 SYSTEM DESIGN DETAILS Ti  Nj , j is an integer (1)
Nj  Vj , Fj
4.1 Attribute Tree construction
After identifying the necessary attributes of the During the training phase the trees are initially
packet, called the deciding set (SA), which can more populated with DoS attack packets of varying classes
clearly distinguish the legitimate packets from the and during the detection phase the trees are
attack packets, as the conformity of each property dynamically updated with incoming real packet
towards its legitimacy decision is not the same, the attributes when analysed to be an attack packet.
packet elicitor extracts the deciding set of attributes The range and type of values taken by the
from the incoming packets. The deciding set is various attributes defined by S A, is not within a
selected such that when some attributes fail to detect defined boundary. In order to perform effective
the packet correctly, the others in the set should be searching of the trees it is proposed to convert the
able to do it. Hence they are not considered as actual values to an equivalent hash integer values .
independent quantities; instead, they are highly The field Vj of the jth node of an attribute defines the
interrelated with each other such that each feature hash equivalent of the actual attribute value. Pearson
completely cooperates with the rest in deciding the hashing [35] is simple and less likely to have
legitimacy of the packets. collisions. Given an input (C), consisting of any
Each element (Ai) in the deciding set SA, is number of bytes, it produces as output, a single byte
represented by a binary search tree Ti . The tree Ti is (h) that is strongly dependent on every byte of the
represented as a collection of nodes N1,N2 etc input. Its implementation requires only few

Ubiquitous Computing and Communication Journal 4


instructions, and a 256-byte lookup table (T) during that period. Based on the number of new
containing a permutation of the values 0 through 255 nodes inserted in a tree as well as the total number of
as defined below. new nodes added in the set of trees (Mtotal), weight
value of each tree is updated as stated in Eq.(2), to
h[0] = 0 fix its weightage relatively proportional to its
for i in 1..n relevance in detecting attacks.
index = h[i-1] xor C[i]
h[i] = T[index]
W i t  t  W i t  (W i t  M i  M total) (2)
end loop
return h[n]
where W i t  t defines the weight assigned to tree Ti
The field Fj of the node Nj defines the number of at time instant of t+Δt and W i t is the corresponding
the packets with the equivalent attribute value of Vj value at time t. The functionality of tree attributer
i.e. the frequency of occurrence of Vj as two packets that attributes trees with weights dynamically is
that are perfectly similar get mapped only to a single defined in the following pseudo code.
value according to the hash function. The tree is
subjected to updations only when a packet which has set weight of all trees as 1
been detected as an attack is used to update the tree. set miss-count of all trees as 0
In all other situations a mere look up is carried out to
search for the presence of a particular node. repeat
Whenever a new attribute value needs to be inserted do until time t = t+Δt
in the tree, its frequency (F) is set to 1. For each repeat for each incoming packet
successive insertions of the same node value, its read packet's attributes
frequency(F) is incremented. This is done whenever repeat for each attribute
the packet analyzed by the traffic classifier is extract the attribute value val
categorized as an attack and its hashed value of the let hash(val) be h
feature is the same as the value of that particular search tree for h
node. if a node n found with value v=h then
increment its frequency f
4.2 Prioritizing the Attributes else insert a new node with v = h,set f = 1
The various attributes selected for detecting DoS and increment tree miss-count
attacks need not contribute the same in detection end repeat
process. Each attribute may have some end repeat
characteristics to identify the legitimacy or attack end do
relatively better for certain classes of attack than record the miss-count of all trees and sum up as
others. Then there are chances that these features can miss-counts
be used to classify the packets more easily and so if change in previous miss-count then
these attributes need to be given more credence update its weight value to weight_new
compared to others. Hence the trees representing the weight_new = weight_old - (weight_old * miss-
packet attributes are attributed by a weight factor count / miss-counts)
symbolizing the priority of the attributes’ role in the end repeat
attack detection process.
The weight Wi associated with the attribute Ai 4.3 Optimal Search Tree
or tree Ti takes a value in the closed interval [0 1] Given n nodes, it is possible to construct 2nCn
which is the ratio to which it can classify a packet /(n+1) different valid binary search trees. One of the
correctly. All the trees are assigned a weight value of objective of the attack detector is to detect attacks as
1 during the starting of the training period. After a early and as fast as possible thereby attack traffic can
period of time allowing the trees to get stabilized be prevented from entering the network even. For
with training data set, the trees are updated with new finding the legitimacy of the packets, tree searching
weight values as computed by the algorithm. The is associated and needs to be efficient. If the attribute
weight values are updated periodically depending on value of attack packets represented by a node in the
the rate of traffic flow during detection phase. The corresponding tree is near the root level, then during
weight values get modified based on the number of attack the tree searching to hash such values in the
tree misses. Whenever the value extracted from the trees become easy and fast. Moreover as the input is
current packet for the attribute is not already a part of very random, there is a probability that the tree
the tree, as a node when hashed to the tree, it is becomes imbalanced in height which may lead to
marked as tree miss. After a period of time Δt, the longer searches. Without loss of generality, it can be
number of tree- misses (Mi ) is calculated for each assumed that the searches made in the trees are
tree indicating the number of new nodes added proportional to the frequency values in each node.

Ubiquitous Computing and Communication Journal 2


However, when there is a severe attack, most of needed to minimize the tree search to the maximum
the packets are attack packets and in which case, it is extent possible. When the traffic is normal,

60 2 62 6

46 4 78 2 46 4 80 3

25 2 60 2 78 2
25 2 62 6 80 3

67 1 67 1

Heaviness = 51 Heaviness = 42

Figure 2: Attribute tree and its equivalent optimized tree

performing a search throughout its height though factor be Si for the tree Ti. Frequency of the node
takes longer time, will add only a very small delay. corresponding to the attribute value of the incoming
So restructuring of the tree helps in achieving the packet is Fi. The value Fi / Si gives the contribution
search efficiency. It is required that there should be of that node or attribute value in that particular tree.
an optimal rearrangement such that the heaviness H Packet score is nothing but the weighed ratio of the
is minimized. For a tree Ti with node Nj having number of attack packets having that value for the
frequency Fj and depth Dj, the heaviness Hi is feature to the total number of packets that have
defined as in Eq.(3). been used to construct the tree. The decision
whether to pass the packet or drop it is taken based
H i  all nodes j ( Fj  Dj ) (3) on this packet score value.

For optimizing the tree, a parameter called tree Score   attributes i (W i  Fi  S i ) /  attributes i (W i )
heaviness is considered as the objective function. It (4)
The root node is defined as level 1 and successive The packets scoring a high value is detected as
siblings at successive levels. The optimal tree is an attack as they resemble the more frequently
obtained using dynamic programming approach as occurred packets structured in the attribute trees for
applied in the Maximum Chain Multiplication attack traffic. Packets scoring a lower value may
problem. From a given set of nodes, the most not be attack packets. Some delimiter value for the
appropriate root node is chosen that serves the best. score is to be used to classify the packets as attack
The same procedure is applied at all levels or not. This threshold value should be able to
recursively to arrive at the most optimized tree. It is correctly classify the packets. This is determined
the most appropriate tree needed which satisfies all using the sensitivity analysis by plotting the
the constraints and is optimal. An example attribute response curves of the traffic classification for
tree with depth 4 and its equivalent optimized tree various threshold values. The statistics is collected
are shown in Fig.2 for legitimate, attack and mixed traffic. Let the
attack threshold value figured out is Tha. If score >
5 DEFENSE STRATEGY – PACKET Tha, then the packet is classified as attack and is
SCORE used to update the trees and then dropped at the
router itself. This feedback of the attack
Size of a tree is defined by the number of characteristics helps in refining the detection
packets that have been used to construct that tree. accuracy by enabling the packets to score values
Numerically it is equal to the sum of the that have distinct margins for attack and legitimate
frequencies of all the nodes of the tree. Let this size packets.

Ubiquitous Computing and Communication Journal 3


The defense mechanism is deployed in active features is identified for the six attributes
routers at the perimeter of the network. Routers get considered for traffic classification by the proposed
their defense structures updated periodically by system namely Destination address and port,
way of exchange of attack knowledge from peer Source address, Frequency of packets per flow,
routers. The router updation is essential for Frequency variations in traffic flow, Length of the
preventing attacks at the source network. Instead of packets per flow, Type of protocol used in per flow
sending the whole tree structures, which is costly, traffic. Six attribute trees are used and packets over
the routers are designed to send the hash value of a time window of 2 plus minutes is used to analyze
the node whenever the frequency of that node hits a the output parameters.
particular threshold as defined. The router
information exchange is part of the prevention 6.2 Performance Analysis
mechanism of the system. The threshold value for the packet score to
discriminate the attack traffic is evaluated as
depicted in fig. 4 and fig. 5. The system is tested
6 RESULTS AND ANALYSIS OF with attack traffic and legitimate traffic separately
SIMULATED STUDY to define the limit. As the threshold value
approaches 0.32, the number of attack packets
6.1 Simulation Environment getting dropped at the router is increased. Similarly
the maximum legitimate traffic passed through the
The proposed system is deployed in active routers is for the threshold value nearly 0.3. Hence
networks where the routers are programmable. the attack threshold Tha is set as 0.32 for testing.
ANTS is a Java based toolkit used for constructing
an active network and the solution is deployed and
tested in ANTS. As ANTS has limitation in the size
of topology that can be defined, a distributed
version is developed, as defined in our earlier
work[36], to support larger network topology for
simulation. The test topology with zombies to
launch DDoS attacks as shown in fig.3 is used for
testing the defense system proposed that is
deployed in all the intelligent routers at the network
perimeter.
Figure 4: Flow through router for attack traffic

Figure 5: Flow through router for legitimate traffic

Figure 3: Test topology in active network Based on various simulation runs performed
using generic, nominal and SYN-flood attacks, the
DARPA dataset is the standard dataset in the false alarm rate is evaluated. The average false
field of intrusion detection [37],[38] .KDD 99 positive percentage is 2.65 for nominal traffic and 0
intrusion detection datasets, which are based on for others while the average false negative
DARPA 98 dataset, provides labeled data for percentage is 2.5, 2.08, 3.55 for generic, nominal
feature identification and is the only labeled dataset and SYN flood attacks. Since the solution deployed
publicly available. 10% of the data set corresponds at the routers employs feed back loops to allow
to DoS attacks. In the training data set containing learning cum detection for fine tuning the detection
24 attack types classified into 4 broad classes, only process, it is justified that false negative rate exceed
the DoS class of records were taken as the data set false positive as some attack packets get through
for evaluation. The relevance of each feature in the routers undetected at the initial time instances
KDD 99 intrusion detection datasets with 41 of testing time window.

Ubiquitous Computing and Communication Journal 2


[8] J. Ioannidis and S.M. Bellovin: Implementing
7 CONCLUSION Pushback: Router-Based Defense Against DDoS
Attacks, Proceedings of Network and Distributed
DDoS attacks threatening the inter network System Security Symposium (2002).
services need to be detected effectively and as early
as possible. In this paper, an effective detection [9] M. Adler: Trade-offs in probabilistic packet
method using packet features mined using set of marking for IP trace back Journal of the ACM, vol.
trees for detection has been proposed. As the static 52, no. 2, pp. 217-244 ( 2005).
nature of the trees prevents it from gaining
knowledge as traffic pattern changes on the fly, for [10] A. Yaar, A. Perrig, and D. Song: FIT: Fast
the new attack patterns, a dynamic updation Internet trace back, IEEE INFOCOM, pp. 1395-
algorithm has been employed by restructuring it 1406, (2005).
into an array of optimal attribute trees.
Attribute trees have been designed such that [11] A. Belenky and N. Ansari: IP Trace back with
they keep track of the distinct properties of attack Deterministic Packet Marking, IEEE
packets as learned from attack traffic profile to communications Letters, vol. 7, no. 4, pp. 162-164
improve detection accuracy. Hence multiple trees (2003).
do help in determining the legitimacy of the packets.
The trees are weighed to reflect the efficiency with [12] A. Yaar, A. Perrig, and D. Song: Pi: A path
which it can classify the packet as attack or identification mechanism to defend against DDoS
legitimate. To prevent the random growth of the attacks, IEEE Symposium on Security and Privacy,
trees, an optimization mechanism has been applied pp. 93-107 ( 2003).
for efficient searching of the tree to improve the
detection time as well as the detection efficiency. [13] A. Yaar, A. Perrig, and D. Song. SIFF: A
As the detection mechanism is deployed at source Stateless Internet Flow Filter to mitigate DDoS
network, it also acts as a prevention system, though flooding attacks, IEEE Symposium on Security and
not a complete prevention system. Privacy( 2004).

8 REFERENCES [14] Xiaowei Yang, David Wetherall and Thomas


Anderson: A DoS limiting Network Architecture
[1] L.Garber: Denial of service attacks rip the Inter SIGCOMM’05, pp: 22–26 , (2005).
net, IEEE Computer, vol. 33, no. 4, pp. 12-17
(2000). [15] Takanori Komatsu and Akira Namatame: On
the Effectiveness of Rate-Limiting Methods to
[2] D. Pappalardo and E. Messmer: Extortion Via Mitigate Distributed DoS (DDoS) Attacks, IEICE
DDoS on the Rise, Network World( 2005). Transactions on Communications, E90-B(10), pp:
http://www.networkworld.com/news/2005/051605- 2665-2672 (2007).
ddos-extortion.html
[16] C.-K. Fung and M.C. Lee: A Denial-of-Service
[3] D.L.Tennenhouse and D.J.Wetherall: Towards Resistant Public-key Authentication and Key
active network architecture, Computer Establishment Protocol, Proceedings of IEEE
communication review,vol.26,no.2( 1996). International Performance, Computing and
Communications, (2002).
[4] K. L. Calvert et al.: Directions in Active
Networks, IEEE Communications( 2001). [17] Shuyuan Jin, Daniel S. Yeung: A Covariance
Analysis Model for DDoS Attack Detection, IEEE
[5] P. Ferguson and D. Senie: Network Ingress Communications ( 2004).
Filtering: Defeating Denial of Service Attacks
which Employ IP Source Address Spoofing, RFC [18] George Oikonomou, Peter Reiher, Max
2827 (2000). Robinson, and Jelena Mirkovic: A Framework for
Collaborative DDoS Defense, Proceedings of the
[6] S.Templeton: Detecting Spoofed Packets, Annual Computer Security Applications
Seminars , UC Davis Computer Security Conference ( 2006)
Laboratory ( 2002).
[19] Matthew Beaumont-Gay: A Comparison of
[7] Cheng Jin, Kang G. Shin, and Haining Wang: SYN Flood Detection Algorithms, Proceedings of
Defense Against Spoofed IP Traffic Using Hop- the Second International Conference on Internet
Count Filtering, IEEE/ACM Transactions on Measurement and Protection ( 2007).
Networking ( 2007).
[20] Jelena Mirkovic, Peter Reiher: D-WARD: A

Ubiquitous Computing and Communication Journal 3


Source End Defense against Flooding Denial of active networks, Proc. of International conference
Service Attacks, IEEE transactions on Dependable on Information security, pp: 242-248 (2005)
and Secure computing, Vol. 2, No. 3, pp. 216-
232(2005). [31] Kumar: Classification and Detection of
Computer Intrusions, Doctoral Dissertation, Purdue
[21] Keromytis, A.D. Misra, V. Rubenstein, D.: University(1995)
SOS: an architecture for mitigating DDoS attacks,
IEEE Journal on Selected Areas in [32] .Breiman: Random Forests, Machine Learning,
Communications, Volume: 22, Issue: 1,pp: 176- 45(1):5–32( 2001)
188 (2004)
[33] Frederick Livingston: Implementation of
[22] Papadopoulos, C.; Lindell, R.; Mehringer, J.; Breiman’s Random Forest Machine Learning
Hussain, A.; Govindan, R.:COSSACK: coordinated Algorithm, ECE591Q Machine Learning Journal
suppression of simultaneous attacks, DARPA Paper ( 2005).
Information Survivability Conference and
Exposition Proceedings, Volume 1, Issue , pp: 2 - [34] Jiong Zhang and Mohammad Zulkernine:
13 (2003) Network Intrusion Detection using Random Forests,
Queen’s University ( 2006).
[23] Robinson, M. Mirkovic, J. Michel, S.
Schnaider, M. Reiher, P.:DefCOM: defensive [35] Peter K. Pearson :Fast Hashing of Variable-
cooperative overlay mesh, DARPA Information Length Text Strings., Communications of the ACM
Survivability Conference and Exposition 33(6), 677 (1990).
Proceedings, Volume: 2,pp: 101- 102, vol.2 (2003)
[36] P.Jayashree, K.S.Easwarakumar, Ramya.P
[24] G. Kim, T. Bogovic, and D. Chee: Active Chandrasekar.M, and Vijay.M: Design of a
Edge-Tagging (ACT): An Intruder Identification & Distributed Active Network Toolkit, proc. of
Isolation Scheme in Active Networks, proceedings International Conference on Contemporary
of 6th IEEE Symposium on Computers and Computing, (2008)
Communications (2001).
[37] R. Lippmann, J. W. Haines, D. J. Fried, J.
[25] D. E. Denning: An intrusion detection model, Korba,and K. Das: The 1999 DARPA offline
IEEE Transactions on Software Engineering, vol. intrusion detection evaluation, Computer Networks,
13,no. 2, pp. 222-232 ( 1987). vol. 34, pp.579–595(2000).

[26] W. Lee, S. J. Stolfo, and K. Mok: A data [38]S. D. Moitra and S. L. Konda: An empirical
mining framework for building intrusion detection investigation of network attacks on computer
model, IEEE Symposium on Security and Privacy, systems, Computers and Security, vol. 23, no. 1, pp.
pp. 120–132(1999). 43–51,(2004).

[27] R. Lippmann and R. K. Cunningham:


Improving intrusion detection performance using
keyword selection and neural networks, Computer
Networks, vol.34, pp. 597–603 ( 2000).

[28] D. E. Goldberg: Genetic Algorithms in Search,


Optimization and Machine Learning, Addison-
Wesley (1989).

[29] D. Zhu, G. Premkumar, X. Zhang, and C.-H.


Chu: Data mining for intrusion detection: A
comparison of alternative methods, Decision
Sciences, vol. 32, no. 4, pp. 635-660( 2001).

[30] T. Verwoerd and R. Hunt: Intrusion detection


techniques and approaches, Computer
Communications, vol. 25, no. 15, pp. 1356-1365
(2002).

[31] P.Jayashree, K.S.Easwarakumar: An


alternative approach to DDoS attack defense in

Ubiquitous Computing and Communication Journal 4


.

Ubiquitous Computing and Communication Journal 5

Anda mungkin juga menyukai