Home > Information technology essays > Improving Network Performance by Differentiating DDoS Attacks from Flash Crowds

Essay: Improving Network Performance by Differentiating DDoS Attacks from Flash Crowds

Essay details and download:

  • Subject area(s): Information technology essays
  • Reading time: 8 minutes
  • Price: Free download
  • Published: 14 October 2015*
  • Last Modified: 23 July 2024
  • File format: Text
  • Words: 1,999 (approx)
  • Number of pages: 8 (approx)

Text preview of this essay:

This page of the essay has 1,999 words.

Abstract : Today’s internet system has various vulnerabilities and threats due to excessive use of it. These threats are increasing day by day among which one is DDoS attack. It is very critical task for today’s defenders to detect DDoS attacks against flash crowds. Both DDoS attack and flash crowd cause surges of access to a server, but flash crowds are unexpected and legitimate. Main tool behind DDoS attack is botnet and botmasters try to disable detection strategy of DDoS attack by mimicking the patterens of flash crowd. So it is the most challenging task today to detect DDoS attack against flash crowd. It was found that the current attack flows are usually more similar to each other compared to the flows of flash crowds. Based on this, the flow correlation coefficient is used as a similarity metric to detect DDOS attack flows from genuine flash crowd flows.
Keywords ‘ Threats, Vulnerabilities, DDoS attack, Botnet, Botmaster, Flash crowd, Flow similarities, Detection.
I. INTRODUCTION
Vulnerabilities to today’s network system are increasing due to excessive and fast moving growth of internet. Attackers are continuously trying to gain unauthorized access over it. One of the prominent threats to internet is Distributed Denial of Service (DDoS) attack. .In network system two events are there which flood the web server, namely DDoS attack and flash crowd. Distributed denial of service attacks contain malicious requests to subvert the normal operation of the website while flash crowds are due to a sudden, large surge in traffic to a particular Web site, created by legitimate requests. Botnets are main engines behind DDoS attacks, and they flood the victim webserver with service requests generated from many bots. Attack requests are similar in content to those generated by legitimate users.
Experienced botmasters attempt to disable dtetection strategy by mimicking the traffic patterns of flash crowds. So during the flash event, the main aim of server is to identify flash crowd attacks or DDoS attacks from genuine flash crowds. It was found that the similarities among the current DdoS attack flows are higher than that of a flash crowd flows. The reason for this phenomenon is that the number of live bots of a current botnet is far less than the number of concurrent legitimate users of a flash crowd.
This paper presents the proposed approach using the flow correlation coefficient as a metric to measure the similarity among suspicious flows to detect DDoS attacks from genuine flash crowds.
II. MOTIVATION
DDOS attacks have increased dramatically in recent years which are demonstrated by the survey [1] of the 70 largest internet operators in the world. Well experienced botmasters take advantage of various techniques to carry out their activities such as
‘ Code obfuscation, memory encryption [4] to disguise their traces
‘ Fresh code pushing for resurrection [5].
‘ Peer-to-peer implementation technology [6], [7], or flash crowd mimicking [8] in order to sustain their botnets.
Flash crowds are unexpected, but legitimate, dramatic surges of access to a server, such as breaking news. When web server is flooded with both DdoS attack and flash crowd requests, it is necessary for server to differentiate between these two types of requests.
Many previous research works have been carried out in attempt to differentiate DdoS attacks from flash crowds. These methods however cannot efficiently differentiate between DdoS attacks and flash crowds. Also most of these methods work properly at application layer only. Our proposed method uses flow correlation coefficient to differentiate between DdoS attacks and flash crowds and can effectively work on network layer also.
III. LITERATURE SURVEY
This section presents review of various research papers those are referred for study of discriminating DDoS attack from flash crowd. Also some facts about current botnets are covered in this section.
‘ Previous work [8], [9] focused on extracting DdoS attack features, and was followed by detecting and filtering DdoS attack packets by the known features. However, these methods cannot actively detect DdoS attacks.
‘ Discriminating Ddos Attack Traffic from Flash Crowd through Packet Arrival Patterns:
A behavior based detection that can discriminate DdoS attack traffic from traffic generated by real users is proposed. By using Pearson’s correlation coefficient, comparable detection methods [13] can extract the repeatable features of the packet arrivals.
‘ Discriminating Ddos Flows from Flash Crowds Using Information Distance:
This method employs abstract distance metrics, the Jeffrey distance, the Sibson distance, and the Hellinger distance to measure the similarity among flows to achieve goal. By comparing the three metrics [14] and found that the Sibson distance is the most suitable with accuracy around 65%.
‘ Distinguishing Ddos Attacks from Flash Crowds Using Probability Metrics:
This work propose a set of novel methods using probability metrics to distinguish Ddos attacks from Flash crowds and propose hybrid probability metrics[15] can greatly reduce both false positive and false negative rates in detection .
‘ Currently most popular defense against flash crowd attacks is the use of graphical puzzles to differentiate between humans and bots [10]. This method involves human responses and can be annoying to users.
‘ Xie and Yu tried to differentiate DdoS attacks from flash crowds at the application layer based on user browsing dynamics [11]. Oikonomou and Mirkovic tried to differentiate the two by modeling human behavior. These behavior-based discriminating methods work well at the application layer. However, it has not seen any detection method at the network layer, which can extend defence diameter far from the potential victim.
‘ There are a number of reports on the size and organization of botnets [7]. Bots are caught by honeypots and analyzed thoroughly via inverse engineering techniques. Botnet infiltrations are further implemented to collect first-hand information about their activities [3], and even implemented a peer-to-peer-based botnet for research purposes.
‘ The attack tools are prebuilt programs, which are usually the same for one botnet. A botmaster issues a command to all bots in his botnet to start one attack session. This can be evidenced from the literature of botnet [4].
‘ The attack flows that are observed at the victim’s end are an aggregation of many original attack flows, and such attack flows share a similar standard deviation as an original attack flow, and the flow standard deviation is usually smaller than that of genuine flash crowd flows. The reason for this phenomenon is that the number of live bots of a current botnet is far less than the number of concurrent legitimate users of a flash crowd.
‘ Rajab et al. recently reported that the live bots of a botnet is at the hundreds or a few thousands level for a given time point [16]. However, it is observed that the found on the Computer number of concurrent users of the flash crowds of World Cup 98 is at the hundreds of thousands level. Therefore, in order to launch a flash crowd attack, a botmaster has to force his live bots to generate many more attack packets, e.g., web page requests, than that of a legitimate user. As a result, the aggregated attack flow possesses a small standard deviation compared with that of a flash crowd.
IV. PROPOSED DIFFERENTIATION METHOD
Proposed differentiation method is based on flow analysis which uses feature of flow similarity to differentiate DdoS attacks from genuine flash crowds under current botnet size and organization, addressing the problem of differentiation at the network layer. Defferentiation method computes correlation coefficient [2] which makes it delay proof and effective against explicit random delay insertion among attack flows. Differentiation algorithm works independently of specific DdoS flooding attack types.
V. SYTEM BLOCK DIAGRAM AND DATA FLOW
A.Block Diagram of System
This differentiation system starts from captured packets as input to the system. Flow correlation coefficient is computed for the captured packets in the system. On the basis of this flow correlation coefficient value, the system will generate differentiation results and display differentiated attack (DDoS) packets from legitimate (flash crowd) packets.
Generate
Compute
Fig 1: Block Diagram of System
B. Data Flow in System
Figure2 shows a Data flow in the differentiation system which is described by following steps.
1. Capture input network packets coming towards community network.
2. Form the network flows for each destination address.
3. Calculate flow strength of network flows.
4. Obtain flow fingerprint.
5. Compute flow correlation coefficient values between two flows with same length.
6. Display differentiated network flows packets.
7. Display result evaluation.
Fig 2: Data Flow in System
VI. MATHEMATICAL MODEL AND DEFINITIONS
A. Mathematical Model
1. X [1”..M] = { }, M’1, X is a network flow.
2. , and N ‘ 1, Xi is ith network flow.
3. , , Number of packets counted in kth time interval.
4. = <Protocol, Source IP, Source Port, Destination IP, Destination Port>
Protocol = <TCP, UDP>
Source IP = <32 bit Source IP Address>
Destination IP = <32 bit Destination IP Address>
Source Port = <16 bit Source Port number>
Destination Port = <16 bit Destination Port number>
5. = {0, 1}, Similarity indicator.
= {1}, DdoS attack Indicator.
B. Definitions
i. Network Flow:
For a given community network, cluster the network packets that share the same destination address as one network flow. Network flow is defined as,
(1)
Where, – given network flow, N ‘ length of given network flow, – represents the number of packets that we counted in the kth time interval for the network flow.
ii. Flow Strength:
Expectation of given flow is defined as flow strength of that flow. Flow strength represents the average packet rate of a network flow.
(2)
Where, – expectation of the flow (flow strength)
iii. Flow Fingerprint:
Flow fingerprint is the unified representation of the given network flow.
(3)
Where, – fingerprint of flow
On the basis of definition (2) and (3), a network flow and its fingerprint is related as,
(4)
Since
Correlation between the two flows is given as,
(5)
It may be indicated zero correlation although the two flows are completely correlated with a phase difference. The definition therefore is modified as:
(6)
Where, k (k = 0, 1, 2, ‘.., N-1) indicates the position shift of flow .
4. Flow Correlation Coefficient
Flow Correlation Coefficient indicates similarity between two flows. Correlation coefficient of the two flows is defined as
For sampled M network flows .Obtain the flow correlation coefficient of any two network flows, and . An indicator for the similarity is of flow and , and which has only two possible values: 1 indicates DdoS attacks and 0 otherwise. Let be the threshold for the differentiation as,
(7)
Where, and
In a community network, there may have two suspected flows. Therefore pairwise comparisons can be conducted to derive the result.
VII. DIFFERENTIATION ALGORITHM
Our differentiation system requires captured network packets as an input and using differentiation algorithm it differentiates DDoS attack flows from legitimate flash crowd flows.
‘ Algorithm for Network Flow Differentiation
1. Start
2. Initialize n, ?? // n- is packet sample size, ?? -discrimination threshold.
3. Identify X , m // X- network flow, m’ number of destination addresses
4. Until sample size>=n do
Xi = {xi[1], xi[2]’..,xi[n]} // i(I >= m), Xi ‘ ith network flow, x-network flow packet
5. Calculate
// FS – flow strength of Xi
6. Calculate
//FF ‘ flow fingerprint of Xi
7. Go to step 3.
8. Until i>= m do
9. Calculate
//r ‘Correlation between the two flows
//FCC ‘ Flow correlation coefficient between Xi and Xj
10. Compare between two flows
If (FCC [Xi,Xj] >= ?? )
{
DDoS attack flows
}
Else
{
Flash crowd flows
}
11. Display differentiated packets of network flows
12. Stop
VIII. RESULT
Resultant graph for input network packet files is as shown in figure1 below. Our proposed method calculates pairwise flow correlation coefficient value for different network flows in input network packet files. The flow correlation coefficient value is compared with threshold value which is defined in between 0 and 1(considered as 0.5 for comparison).If the correlation coefficient is greater than threshold then packets are considered as attack (DDoS) packets otherwise legitimate (flash crowd) packets.
Figure3: Resultant Graph Showing Differentiated Attack (DDoS) Packets from Legitimate (flash crowd) Packets.
IX. CONCLUSION
Proposed differentiation method tried to differentiate distributed denial of service attacks from genuine flash crowds which is most challenging problem today .It found that under the current conditions of botnet size and organization, DDoS attack flows have more similarity than genuine flash crowd flows. So our method used flow correlation coefficient as a metric to measure similarity among network flows. Result confirmed differentiation between DDoS attack flows and genuine flash crowd flows.
Future work will focus on possibility of organizing a super botnet, with a sufficiently large number of live bots which can beat the proposed method. Secondly, if the attacker is known with the proposed strategy then it is necessary to explore actions which there should have to take against attacker’s actions.

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Improving Network Performance by Differentiating DDoS Attacks from Flash Crowds. Available from:<https://www.essaysauce.com/information-technology-essays/essay-improving-network-performance-by-differentiating-ddos-attacks-from-flash-crowds/> [Accessed 19-12-24].

These Information technology essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.