Skip to main content

HLR_DDoS: A Low-Rate and High-Rate DDoS Attack Detection Method Using \(\alpha \)-Divergence

  • Conference paper
  • First Online:
Proceedings of the International Conference on Computing and Communication Systems

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 24))

  • 989 Accesses

Abstract

In this paper, an effective method called HLR_DDoS is proposed to detect both low- and high-rate flooding attacks using a statistical approach. The method detects both types of attacks in two steps: (i) normal traffic analysis using cross-correlation measure and (ii) identification of suspicious high- and low-rate attack traffic using \(\alpha \)-divergence. The proposed method is evaluated on DDoS CAIDA 2007 and DARPA 2000 datasets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hoque, N., Bhuyan, M.H., Baishya, R.C., Bhattacharyya, D., Kalita, J.K.: Network attacks: Taxonomy, tools and systems. Journal of Network and Computer Applications 40 (2014) 307–324

    Google Scholar 

  2. Hoque, N., Bhattacharyya, D.K., Kalita, J.K.: Botnet in ddos attacks: trends and challenges. IEEE Communications Surveys & Tutorials 17 (2015) 2242–2270

    Google Scholar 

  3. Mirkovic, J., Reiher, P.: A taxonomy of ddos attack and ddos defense mechanisms. ACM SIGCOMM Computer Communication Review 34 (2004) 39–53

    Google Scholar 

  4. Xiang, Y., Li, K., Zhou, W.: Low-rate ddos attacks detection and traceback by using new information metrics. Information Forensics and Security, IEEE Transactions on 6 (2011) 426–437

    Google Scholar 

  5. Ahmed, E., Mohay, G., Tickle, A., Bhatia, S.: Use of ip addresses for high rate flooding attack detection. In: Security and Privacy–Silver Linings in the Cloud. Springer (2010) 124–135

    Google Scholar 

  6. Hoque, N., Bhattacharyya, D.K., Kalita, J.K.: Ffsc: a novel measure for low-rate and high-rate ddos attack detection using multivariate data analysis. Security and Communication Networks 9 (2016) 2032–2041

    Google Scholar 

  7. Bhattacharyya D. K., Kalita, J.K.: Ddos attacks: Evolution, detection, prevention, reaction, and tolerance, CRC Press, 2014

    Google Scholar 

  8. Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical approaches to ddos attack detection and response. In: DARPA Information Survivability Conference and Exposition, 2003. Proceedings. Volume 1., IEEE (2003) 303–314

    Google Scholar 

  9. Yu, S., Zhou, W.: Entropy-based collaborative detection of ddos attacks on community networks. In: Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on, IEEE (2008) 566–571

    Google Scholar 

  10. Xiao, B., Chen, W., He, Y., Sha, E.H.: An active detecting method against syn flooding attack. In: Parallel and Distributed Systems, 2005. Proceedings. 11th International Conference on. Volume 1., IEEE (2005) 709–715

    Google Scholar 

  11. Yang, G., Gerla, M., Sanadidi, M.: Defense against low-rate tcp-targeted denial-of-service attacks. In: Computers and Communications, 2004. Proceedings. ISCC 2004. Ninth International Symposium on. Volume 1., IEEE (2004) 345–350

    Google Scholar 

  12. Chen, Y., Hwang, K.: Collaborative detection and filtering of shrew ddos attacks using spectral analysis. Journal of Parallel and Distributed Computing 66 (2006) 1137–1151

    Google Scholar 

  13. Zhang, C., Yin, J., Cai, Z., Chen, W.: Rred: robust red algorithm to counter low-rate denial-of-service attacks. Communications Letters, IEEE 14 (2010) 489–491

    Google Scholar 

  14. Zhang, C., Cai, Z., Chen, W., Luo, X., Yin, J.: Flow level detection and filtering of low-rate ddos. Computer Networks 56 (2012) 3417–3431

    Google Scholar 

  15. Wu, Z.j., Lei, J., Yao, D., Wang, M.h., Musa, S.M.: Chaos-based detection of ldos attacks. Journal of Systems and Software 86 (2013) 211–221

    Google Scholar 

  16. Zhijun, W., Yi, C., Meng, Y., Lan, M., Lu, W.: Cross-correlation based synchronization mechanism of lddos attacks. Journal of Networks 9 (2014) 604–611

    Google Scholar 

  17. Braga, R., Mota, E., Passito, A.: Lightweight ddos flooding attack detection using nox/openflow. In: Local Computer Networks (LCN), 2010 IEEE 35th Conference on, IEEE (2010) 408–415

    Google Scholar 

  18. Liu, H., Sun, Y., Valgenti, V.C., Kim, M.S.: Trustguard: A flow-level reputation-based ddos defense system. In: 2011 IEEE Consumer Communications and Networking Conference (CCNC), IEEE (2011) 287–291

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nazrul Hoque .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hoque, N., Bhattacharyya, D.K. (2018). HLR_DDoS: A Low-Rate and High-Rate DDoS Attack Detection Method Using \(\alpha \)-Divergence. In: Mandal, J., Saha, G., Kandar, D., Maji, A. (eds) Proceedings of the International Conference on Computing and Communication Systems. Lecture Notes in Networks and Systems, vol 24. Springer, Singapore. https://doi.org/10.1007/978-981-10-6890-4_63

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6890-4_63

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6889-8

  • Online ISBN: 978-981-10-6890-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics