preview

Statistical Analysis Of Network Traffic For Detection Of Ddos Attacks

Decent Essays

Statistical Analysis of Network Traffic The use of statistical features of network traffic for detection of DDoS attacks had made good contributions. They can also be used for trace back schemes. The use of Regression Analysis where strength of DDoS attack is estimated and compared with actual strength. The comparison results were promising, indicating that this method is applicable for DDoS strength evaluation in router or a separate unit communicating with the router. Another type of approach named flow-volume based approach can also applied in the process, to build the traffic profile under normal traffic conditions. When total traffic arriving at a router in a designed time window is deviated from the profile, attack is detected and …show more content…

The proposed scheme has an advantage over traditional packet marking schemes in terms of scalability and storage requirements in victim or intermediate routers. The method stores only short-term information of traffic entropy in order to detect the DDoS attack. The research also presented experimental analysis to claim that the method is able to implement accurate trace back in a large-scale DDoS attack scenario within a few seconds. In addition to variation scheme, a few other methods also exist to trace back DDoS sources. The classification is given below. In packet marking schemes, the idea is to trace the path through uplink routers up to the attack sources. It is a common method employed in trace back implementations but contains inherent drawbacks. In the packet logging scheme, the information of each packet is stored at routers through which the packet is passed. The stored information of the packet contains constant header fields and first 8 bytes of the payload which are hashed through many hash functions to produce digests. These digests are stored by DGAs using bloom filter, a space-efficient data structure. In the pushback scheme, the router under congestion sends the rate-limit request to upstream routers. It determines from which routes the stream of packets is arrived and devises an attack signature for such traffic. The signature belongs to the aggregate traffic having common property such as the same destination address. A mechanism called

Get Access