Abstract
DDoS attack is the formidable cyber warfare of 20th century. Lot of research has already been taking place to mitigate DDoS attack. However DDoS attack still remains a potential threat. This research work considers the model level solution. Having a proper model of the traffic flow will help the administration unit to closely monitor the unusual behavior of the traffic; it will also help to identify the flash crowd which is the occasional accumulation of legitimate traffic. Hence in this paper, the normal traffic behavior is modeled, with the help of that the abnormal traffic which is evident during the DDoS attack is detected. Then the methodology to do the flow specific detection to segregate attack flow from the normal flow is discussed. Finally the possibility to curb the attack from the various hops is discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zaroo, P.: A survey of DDoS attacks and some DDoS defense mechanisms. Advanced Information Assurance (CS 626)
Udhayan, J., Hamsapriya, T., Anitha, R.: Lightweight C&C based botnet detection using Aho-Corasick NFA. International Journal of Network Security & Its Applications (IJNSA)Â 2(4) (2010)
Cholda, P., Domzal, J., et al.: Performance Evaluation of P2P Caches: Flash-Crowd Case. In: Australian Telecommunication Networks & Applications Conference (2010)
Udhayan, J., Hamsapriya: Statistical Segregation Method to minimize the effects of false detection during DDoS attack. International Journal of Network Security 13(3), 152–160 (2011)
Best Practices for Performance in ISA Server (2006), http://technet.microsoft.com/en-us/library/bb794835.aspx
PyungKoo, P., HeeKyoung, Y., SangJin, H., JaeCheul, R.: An effective defense mechanism against DoS/DDoS attacks in flow-based routers. In: ACM International Conference on Advances in Mobile Computing and Multimedia, New York, USA (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Udhayan, J., Hamsapriya, T., Vasanthi, N.A. (2012). DDoS Attack Detection through Flow Analysis and Traffic Modeling. In: Das, V.V., Ariwa, E., Rahayu, S.B. (eds) Signal Processing and Information Technology. SPIT 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 62. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32573-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-32573-1_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32572-4
Online ISBN: 978-3-642-32573-1
eBook Packages: Computer ScienceComputer Science (R0)