Skip to main content

DoS Attack Inference Using Traffic Wave Analysis

  • Conference paper
Recent Trends in Networks and Communications (WeST 2010, VLSI 2010, NeCoM 2010, ASUC 2010, WiMoN 2010)

Abstract

DoS attacks are still remaining unsolved mystery in internet. Though various methods such as change point detection, classifier method, packet marking, use of efficient filters and gateways have been proposed to mitigate DoS attacks, all these methods lack in enough accuracy in detection and hence the false alarm. The proposed work performs network traffic monitoring by way of analyzing the generated traffic signal and determines the traffic wavelet coefficients using continuous wavelet transform and based on the wavelet coefficients and energy distribution in successive time intervals, inference of attack occurrence is confirmed. In this paper, DoS attack detection is performed using three types of wavelet functions and the efficiency of different wavelets in the attack detection is compared.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lu, W., Ghorbani, A.A.: Network Anomaly Detection Based on Wavelet Analysis. EURASIP Journal on Advances in Signal Processing, Article ID 837601, 16–32 (2009)

    Google Scholar 

  2. He, W., Hu, G., Yao, X., Kan, G., Xiang, H., Wang, H.: Applying Multiple Time Series Data Mining to Large-Scale Network Traffic Analysis. In: CIS 2008, pp. 394–399 (2008)

    Google Scholar 

  3. Shinde, P., Guntupalli, S.: Early DoS Attack Detection using Smoothened Time-Series and Wavelet Analysis. In: Third International Symposium on Information Assurance and Security, pp. 215–220 (2007)

    Google Scholar 

  4. Benetazzo, L., Narduzzi, C., Pegoraro, P.A.: Internet Traffic Measurement: A Critical Study of Wavelet Analysis. IEEE transactions on instrumentation and measurement 56(3), 800–806 (2007)

    Article  Google Scholar 

  5. Dainotti, A., Pescapé, A., Ventre, G.: Wavelet-based Detection of DoS Attacks. In: IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM, pp. 494–499 (2006)

    Google Scholar 

  6. Soares, L.R., de Oliveira, H.M., Cintra, R.J.S.: Signal Analysis Using Fourier-like Wavelets

    Google Scholar 

  7. Li, L., Lee, G.: DDoS attack detection and wavelets. Springer Science Telecommunication Systems 28(3, 4), 435–451 (2005)

    Article  Google Scholar 

  8. Liu, L., Li, Z., Xu, Y., Mei, C., Tan, X.: A wavelet based distributed ID model. In: Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), pp. 104–110 (2005)

    Google Scholar 

  9. Huang, M.-C.: Wave parameters and functions in wavelet Analysis. In: Ocean Engineering, pp. 111–125. Elsevier, Amsterdam (2004)

    Google Scholar 

  10. Probert, S.A., Song, Y.H.: Detection and Classification of High Frequency Transients using Wavelet Analysis. In: IEEE Power Engineering Society, pp. 801–806 (2002)

    Google Scholar 

  11. Crovella, M., Kolaczyk, E.: Graph Wavelets for Spatial Traffic Analysis. In: Proceedings of ACM SIGCOMM, pp. 185–195 (2002)

    Google Scholar 

  12. Cheng, C.-M., Kung, H.T., Tan, K.-S.: Use of Spectral Analysis in Defense against DoS Attacks. In: Proceedings of IEEE GLOBECOM (2002)

    Google Scholar 

  13. Barford, P., Kline, J., Plonka, D., Amos, R.: A Signal Analysis of Network Traffic Anomalies. In: Proceedings of ACM IMW, pp. 71–82 (2002)

    Google Scholar 

  14. Abry, P., Veitch, D.: Wavelet Analysis of Long-Range-Dependent Traffic. IEEE transactions on Information Theory 44(1), 2–15 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  15. Ramachandran, K., Vetterli, M., Herley, C.: Wavelets, subband coding, and best bases. Proceedings of IEEE 84(4), 541–560 (1996)

    Article  Google Scholar 

  16. Flandrin, P.: Wavelet analysis and synthesis of Brownian motion. IEEE transaction on Information Thoery 38(2), 910–917 (1992)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jayashree, P., Aravinth, T., Ashok Kumar, S., Manikandan, S.K.R. (2010). DoS Attack Inference Using Traffic Wave Analysis. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Networks and Communications. WeST VLSI NeCoM ASUC WiMoN 2010 2010 2010 2010 2010. Communications in Computer and Information Science, vol 90. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14493-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14493-6_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14492-9

  • Online ISBN: 978-3-642-14493-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics