Abstract
Denials of service attacks are well-known as one of the major threats in today’s Internet services. It is hard to detect this type of attack, because in most cases it can not be detected with signature-based methods, because DDoS traffic often looks like normal.
This paper proposes an approach of the indirect detection of DDoS attacks and anomalies in an abuse of system resources, based on the system performance monitoring with an artificial immune system algorithm. This approach can quickly detect and warn about an abnormal server load, some types of DDoS attacks, mining scripts, botnet scripts, and ransomware.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Arbor networks releases global DDoS attack data for 1H 2016 (2016). https://www.netscout.com/news/press-release/global-ddos-attack-data
Morales, C.: NETSCOUT arbor confirms 1.7 Tbps DDoS attack; the terabit attack era is upon us (2018). https://asert.arbornetworks.com/netscout-arbor-confirms-1-7-tbps-ddos-attack-terabit-attack-era-upon-us/
NCCIC: understanding denial-of-service attacks https://www.us-cert.gov/ncas/tips/ST04-015
Suraparaju, V.: Taxonomy of DDoS attack (2016). https://www.researchgate.net/figure/Taxonomy-of-DDoS-attack/-4-Various-researchers/-have-given-different/-classifications/-for_fig3_309466519
Kshirsagar, D., Sawant, S., Rathod, A., Wathore, S.: CPU load analysis & minimization for TCP syn flood detection. Procedia Comput. Sci. 85, 626–633 (2016)
Girma, A., Garuba, M., Li, J., Liu, C.: Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect DDoS attacks on cloud computing environment. In: 2015 12th International Conference on Information Technology-New Generations, pp. 212–217. IEEE (2015)
Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutorials 16(1), 266–282 (2014)
Modi, C.N., Acha, K.: Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review. J. Supercomput. 73(3), 1192–1234 (2017)
Bhuyan, M.H., Bhattacharyya, D., Kalita, J.K.: An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recogn. Lett. 51, 1–7 (2015)
Brownlee, J.: Clever Algorithms: Nature-Inspired Programming Recipes (2015)
Li, D., Liu, S., Zhang, H.: Negative selection algorithm with constant detectors for anomaly detection. Appl. Soft Comput. 36, 618–632 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Burmaka, I., Zlobin, S., Lytvyn, S., Nekhai, V. (2020). Detecting Flood Attacks and Abnormal System Usage with Artificial Immune System. In: Palagin, A., Anisimov, A., Morozov, A., Shkarlet, S. (eds) Mathematical Modeling and Simulation of Systems. MODS 2019. Advances in Intelligent Systems and Computing, vol 1019. Springer, Cham. https://doi.org/10.1007/978-3-030-25741-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-25741-5_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-25740-8
Online ISBN: 978-3-030-25741-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)