Abstract
DoS attacks are still remaining unsolved mystery in internet. Though various methods such as change point detection, classifier method, packet marking, use of efficient filters and gateways have been proposed to mitigate DoS attacks, all these methods lack in enough accuracy in detection and hence the false alarm. The proposed work performs network traffic monitoring by way of analyzing the generated traffic signal and determines the traffic wavelet coefficients using continuous wavelet transform and based on the wavelet coefficients and energy distribution in successive time intervals, inference of attack occurrence is confirmed. In this paper, DoS attack detection is performed using three types of wavelet functions and the efficiency of different wavelets in the attack detection is compared.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lu, W., Ghorbani, A.A.: Network Anomaly Detection Based on Wavelet Analysis. EURASIP Journal on Advances in Signal Processing, Article ID 837601, 16–32 (2009)
He, W., Hu, G., Yao, X., Kan, G., Xiang, H., Wang, H.: Applying Multiple Time Series Data Mining to Large-Scale Network Traffic Analysis. In: CIS 2008, pp. 394–399 (2008)
Shinde, P., Guntupalli, S.: Early DoS Attack Detection using Smoothened Time-Series and Wavelet Analysis. In: Third International Symposium on Information Assurance and Security, pp. 215–220 (2007)
Benetazzo, L., Narduzzi, C., Pegoraro, P.A.: Internet Traffic Measurement: A Critical Study of Wavelet Analysis. IEEE transactions on instrumentation and measurement 56(3), 800–806 (2007)
Dainotti, A., Pescapé, A., Ventre, G.: Wavelet-based Detection of DoS Attacks. In: IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM, pp. 494–499 (2006)
Soares, L.R., de Oliveira, H.M., Cintra, R.J.S.: Signal Analysis Using Fourier-like Wavelets
Li, L., Lee, G.: DDoS attack detection and wavelets. Springer Science Telecommunication Systems 28(3, 4), 435–451 (2005)
Liu, L., Li, Z., Xu, Y., Mei, C., Tan, X.: A wavelet based distributed ID model. In: Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), pp. 104–110 (2005)
Huang, M.-C.: Wave parameters and functions in wavelet Analysis. In: Ocean Engineering, pp. 111–125. Elsevier, Amsterdam (2004)
Probert, S.A., Song, Y.H.: Detection and Classification of High Frequency Transients using Wavelet Analysis. In: IEEE Power Engineering Society, pp. 801–806 (2002)
Crovella, M., Kolaczyk, E.: Graph Wavelets for Spatial Traffic Analysis. In: Proceedings of ACM SIGCOMM, pp. 185–195 (2002)
Cheng, C.-M., Kung, H.T., Tan, K.-S.: Use of Spectral Analysis in Defense against DoS Attacks. In: Proceedings of IEEE GLOBECOM (2002)
Barford, P., Kline, J., Plonka, D., Amos, R.: A Signal Analysis of Network Traffic Anomalies. In: Proceedings of ACM IMW, pp. 71–82 (2002)
Abry, P., Veitch, D.: Wavelet Analysis of Long-Range-Dependent Traffic. IEEE transactions on Information Theory 44(1), 2–15 (1998)
Ramachandran, K., Vetterli, M., Herley, C.: Wavelets, subband coding, and best bases. Proceedings of IEEE 84(4), 541–560 (1996)
Flandrin, P.: Wavelet analysis and synthesis of Brownian motion. IEEE transaction on Information Thoery 38(2), 910–917 (1992)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jayashree, P., Aravinth, T., Ashok Kumar, S., Manikandan, S.K.R. (2010). DoS Attack Inference Using Traffic Wave Analysis. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Networks and Communications. WeST VLSI NeCoM ASUC WiMoN 2010 2010 2010 2010 2010. Communications in Computer and Information Science, vol 90. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14493-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-14493-6_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14492-9
Online ISBN: 978-3-642-14493-6
eBook Packages: Computer ScienceComputer Science (R0)