Skip to main content

A Low-Rate DoS Detection Based on Rate Anomalies

  • Conference paper
Applied Informatics and Communication (ICAIC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 226))

Included in the following conference series:

  • 1582 Accesses

Abstract

Low-rate Denial-of-Service attacks are stealthier and trickier than traditional DDoS attacks. According to the characteristic of periodicity and short burst in LDoS flows, a detection measure against LDoS attacks based on rate anomalies has been proposed. In the period when the router packet loss-rate is abnormal caused by the attack pulse, the rate of attack flow is large, while in other time the rate of attack flow is close to 0. In the view point of the periods that the packet loss is abnormal, we can find that the attack flow rate is far higher in these periods than the average rate, while the normal flow is lower to the average rate. In this paper, we proposed a measure that observes the flow rate in the periods that the packet loss rate is abnormal, computing the difference of the rate in these periods and the average rate. If it is beyond a certain threshold, treats the flow as a malicious flow and filters the flow with corresponding method.

Supported by National Natural Science Foundation of China (Grant No. 61070010), National Science Foundation for Post-doctoral Scientists of China, the Natural Science Foundation of Hubei Province and the Fundamental Research Funds for the Central Universities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kuzmanovic, A., Knightly, E.W.: Low-Rate TCP Targeted Denial of Service Attacks—The Shrew vs. the Mice and Elephants. In: Proc.of 2003 ACM SIGCOMM, Karlsruhe, Germany (2003)

    Google Scholar 

  2. Chan, M.C., Chang, E.-C., Lu, L., Ngiam, P.S.: Effect of malicious synchronization. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 114–129. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Guirguis, M., et al.: Reduction of Quality (RoQ) Attacks on Internet End-Systems. In: Proceedings of the 24th IEEE INFOCOM (INFOCOM 2005), Miami, Florida (2005)

    Google Scholar 

  4. Guirguis, M., et al.: Exploiting the transients of adaptation for RoQ attacks on internet resources. In: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), Berlin, Germany (2004)

    Google Scholar 

  5. Sarat, S., Terzis, A.: On the effect of router buffer sizes on low-rate denial of service attacks. Institute of Electrical and Electronics Engineers Inc., San Diego (2005)

    Book  Google Scholar 

  6. Kwok, Y.-K., et al.: HAWK, ”Halting Anomalies with Weighted choKing to rescue well-behaved TCP sessions from shrew DDoS attacks”, D-69121. Springer, Heidelberg (2005)

    Google Scholar 

  7. Sun, H., Lui, J., Yau, D.: Defending Against Low-Rate TCP Attacks: Dynamic Detection and Protection. In: Proc. ICNP 2004: the 12th IEEE International Conference on Network Protocols, Berlin, Germany (2004)

    Google Scholar 

  8. Sun, H., Lui, J.C.S., Yau, D.K.Y.: Distributed mechanism in detecting and defending against the low-rate TCP attack. Computer Networks 50(13), 2312–2330 (2006)

    Article  MATH  Google Scholar 

  9. Chen, Y., Hwang, K.: Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Journal of Parallel and Distributed Computing 66(9), 1137–1151 (2006)

    Article  MATH  Google Scholar 

  10. Wu, Z., Yue, M.: Kalman filter-based attack detection method LDDoS. Electronics 36(8), 1590–1594 (2008)

    Google Scholar 

  11. He, Y., Liu, T., Han, Y., Xiong, Q., Cao, Q.: A Distributed Collaborative for LDoS attack detection. Microcomputer 30(3) (2009)

    Google Scholar 

  12. He, Y., Cao, Q., Liu, T., Han, Y., Xiong, Q.: A low-rate DoS detection method based on characteristic of wavelet. Journal of Software 20(4), 930–941 (2009) (in Chinese with English abstract)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, L., Cheng, J., He, Y., Xu, A., Wen, P. (2011). A Low-Rate DoS Detection Based on Rate Anomalies. In: Zhang, J. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 226. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23235-0_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23235-0_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23234-3

  • Online ISBN: 978-3-642-23235-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics