2014 Ninth Asia Joint Conference on Information Security 2014
DOI: 10.1109/asiajcis.2014.23
|View full text |Cite
|
Sign up to set email alerts
|

Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets

Abstract: In this work, we propose a method to discriminate backscatter caused by DDoS attacks from normal traffic. Since DDoS attacks are imminent threats which could give serious economic damages to private companies and public organizations, it is quite important to detect DDoS backscatter as early as possible. To do this, 11 features of port/IP information are defined for network packets which are sent within a short time, and these features of packet traffic are classified by Suppurt Vector Machine (SVM). In the ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…In prior research [1], [2], [14], [7], [15], [10], [9], [16], [17], [5], [18], [19], darknet data is used to detect botnet hosts, typically by clustering and classifying the src IPs with features such as the dst port and packet size.…”
Section: A Mining Darknet Trafficmentioning
confidence: 99%
“…In prior research [1], [2], [14], [7], [15], [10], [9], [16], [17], [5], [18], [19], darknet data is used to detect botnet hosts, typically by clustering and classifying the src IPs with features such as the dst port and packet size.…”
Section: A Mining Darknet Trafficmentioning
confidence: 99%
“…Through investigation of related works, we find that detection features mainly include: entropy [24]- [27], conditional entropy [28], Renyi entropy [29], ϕ-entropy of source ip (destination ip, protocol) [30], occurrence rate of TCP packet (UDP packet, ICMP packet) [25], percent of packets with the port number 80, variance of the numbers of packets to each destination ip, average of payloads, probability of occurrence of IP [31], mean time intervals (MTI), TTL, time stamp, ACK value, SYN value [32], variation index of source IPs [33], answer resource record, authority resource record, average packet size [34] and etc. Among the above 38 features, the most widely used features are the following 13 ones: entropy of source ip (H (Sip)), entropy of destination ip (H (Dip)), entropy of source port (H (Sport)), entropy of destination port (H (Dport)), conditional entropy of source ip given destination ip (H (Sip | Dip)), conditional entropy of source ip given destination port (H (Sip | Dport)), conditional entropy of destination port given destination ip (H (Dport | Dip)), One-Way Connection Density (OWCD), entropy of packet type (H (PacType)), occurrence rate of TCP packet (TCPRate), occurrence rate of UDP packet (UDPRate) and occurrence rate of ICMP packet (ICMPRate), time interval of packets (PckTimeInt).…”
Section: A Candidate Feature Setmentioning
confidence: 99%
“…Cyber attacks are currently experiencing an exciting development with various targets and patterns [1][2][3][4][5]. DDoS is a malicious attack that blocks the traffic of a server service by flooding the target or the surrounding infrastructure [6][7][8]. Millennials are targets and attackers to disrupt and undermine reputation.…”
Section: Introductionmentioning
confidence: 99%