Skip to main content

DDoS Attack Detection through Flow Analysis and Traffic Modeling

  • Conference paper
Signal Processing and Information Technology (SPIT 2011)

Abstract

DDoS attack is the formidable cyber warfare of 20th century. Lot of research has already been taking place to mitigate DDoS attack. However DDoS attack still remains a potential threat. This research work considers the model level solution. Having a proper model of the traffic flow will help the administration unit to closely monitor the unusual behavior of the traffic; it will also help to identify the flash crowd which is the occasional accumulation of legitimate traffic. Hence in this paper, the normal traffic behavior is modeled, with the help of that the abnormal traffic which is evident during the DDoS attack is detected. Then the methodology to do the flow specific detection to segregate attack flow from the normal flow is discussed. Finally the possibility to curb the attack from the various hops is discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zaroo, P.: A survey of DDoS attacks and some DDoS defense mechanisms. Advanced Information Assurance (CS 626)

    Google Scholar 

  2. Udhayan, J., Hamsapriya, T., Anitha, R.: Lightweight C&C based botnet detection using Aho-Corasick NFA. International Journal of Network Security & Its Applications (IJNSA) 2(4) (2010)

    Google Scholar 

  3. Cholda, P., Domzal, J., et al.: Performance Evaluation of P2P Caches: Flash-Crowd Case. In: Australian Telecommunication Networks & Applications Conference (2010)

    Google Scholar 

  4. Udhayan, J., Hamsapriya: Statistical Segregation Method to minimize the effects of false detection during DDoS attack. International Journal of Network Security 13(3), 152–160 (2011)

    Google Scholar 

  5. Best Practices for Performance in ISA Server (2006), http://technet.microsoft.com/en-us/library/bb794835.aspx

  6. PyungKoo, P., HeeKyoung, Y., SangJin, H., JaeCheul, R.: An effective defense mechanism against DoS/DDoS attacks in flow-based routers. In: ACM International Conference on Advances in Mobile Computing and Multimedia, New York, USA (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Udhayan, J., Hamsapriya, T., Vasanthi, N.A. (2012). DDoS Attack Detection through Flow Analysis and Traffic Modeling. In: Das, V.V., Ariwa, E., Rahayu, S.B. (eds) Signal Processing and Information Technology. SPIT 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 62. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32573-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32573-1_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32572-4

  • Online ISBN: 978-3-642-32573-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics