Skip to main content

Detecting Flood Attacks and Abnormal System Usage with Artificial Immune System

  • Conference paper
  • First Online:
Mathematical Modeling and Simulation of Systems (MODS 2019)

Abstract

Denials of service attacks are well-known as one of the major threats in today’s Internet services. It is hard to detect this type of attack, because in most cases it can not be detected with signature-based methods, because DDoS traffic often looks like normal.

This paper proposes an approach of the indirect detection of DDoS attacks and anomalies in an abuse of system resources, based on the system performance monitoring with an artificial immune system algorithm. This approach can quickly detect and warn about an abnormal server load, some types of DDoS attacks, mining scripts, botnet scripts, and ransomware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Arbor networks releases global DDoS attack data for 1H 2016 (2016). https://www.netscout.com/news/press-release/global-ddos-attack-data

  2. Morales, C.: NETSCOUT arbor confirms 1.7 Tbps DDoS attack; the terabit attack era is upon us (2018). https://asert.arbornetworks.com/netscout-arbor-confirms-1-7-tbps-ddos-attack-terabit-attack-era-upon-us/

  3. NCCIC: understanding denial-of-service attacks https://www.us-cert.gov/ncas/tips/ST04-015

  4. Suraparaju, V.: Taxonomy of DDoS attack (2016). https://www.researchgate.net/figure/Taxonomy-of-DDoS-attack/-4-Various-researchers/-have-given-different/-classifications/-for_fig3_309466519

  5. Kshirsagar, D., Sawant, S., Rathod, A., Wathore, S.: CPU load analysis & minimization for TCP syn flood detection. Procedia Comput. Sci. 85, 626–633 (2016)

    Article  Google Scholar 

  6. Girma, A., Garuba, M., Li, J., Liu, C.: Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect DDoS attacks on cloud computing environment. In: 2015 12th International Conference on Information Technology-New Generations, pp. 212–217. IEEE (2015)

    Google Scholar 

  7. Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutorials 16(1), 266–282 (2014)

    Article  Google Scholar 

  8. Modi, C.N., Acha, K.: Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review. J. Supercomput. 73(3), 1192–1234 (2017)

    Article  Google Scholar 

  9. Bhuyan, M.H., Bhattacharyya, D., Kalita, J.K.: An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recogn. Lett. 51, 1–7 (2015)

    Article  Google Scholar 

  10. Brownlee, J.: Clever Algorithms: Nature-Inspired Programming Recipes (2015)

    Google Scholar 

  11. Li, D., Liu, S., Zhang, H.: Negative selection algorithm with constant detectors for anomaly detection. Appl. Soft Comput. 36, 618–632 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ivan Burmaka .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Burmaka, I., Zlobin, S., Lytvyn, S., Nekhai, V. (2020). Detecting Flood Attacks and Abnormal System Usage with Artificial Immune System. In: Palagin, A., Anisimov, A., Morozov, A., Shkarlet, S. (eds) Mathematical Modeling and Simulation of Systems. MODS 2019. Advances in Intelligent Systems and Computing, vol 1019. Springer, Cham. https://doi.org/10.1007/978-3-030-25741-5_14

Download citation

Publish with us

Policies and ethics