2018
DOI: 10.1587/transinf.2018edl8020
|View full text |Cite
|
Sign up to set email alerts
|

Source-Side Detection of DRDoS Attack Request with Traffic-Aware Adaptive Threshold

Abstract: Distributed Reflective Denial of Services (DRDoS) attacks have gained huge popularity and become a major factor in a number of massive cyber-attacks. Usually, the attackers launch this kind of attack with small volume of requests to generate a large volume of attack traffic aiming at the victim by using IP spoofing from legitimate hosts. There have been several approaches, such as static threshold based approach and confirmation-based approach, focusing on DRDoS attack detection at victim's side. However, thes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…The one of method of a source-side DoS attack detection mechanism is predicting the volume of normal network traffic. The volume of network traffic observed in the source-side network is relatively small, and more accurate prediction of network traffic is required in order to adjust threshold in a fine-tuned manner [3], [4].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The one of method of a source-side DoS attack detection mechanism is predicting the volume of normal network traffic. The volume of network traffic observed in the source-side network is relatively small, and more accurate prediction of network traffic is required in order to adjust threshold in a fine-tuned manner [3], [4].…”
Section: Related Workmentioning
confidence: 99%
“…network, the normal traffic can be easily mixed with attack traffic. To separate a relatively small volume of attack traffic, an adaptive threshold method using the observed traffic volume was studied [3]. However, if the observed traffic is mixed with the attack traffic, the adaptive threshold method should separate the attack traffic from the observed traffic to calculate the next threshold.…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, this subtle attack traffic could cause some problems for machine learning based methods [5]. Up to date, our former work [16] has proposed establishing an adaptive threshold for detecting the subtle DoS attack based on the observed traffic over continuous periods. However, the drawback of this method is high false positive.…”
Section: Related Workmentioning
confidence: 99%
“…OTAT algorithm means using the traffic volume aware adaptive threshold establishment without help of seasonality aware threshold adjustment, and OTAT is analogous to the previous approach in [16]. In OTAT, when attack is detected at a time window, it keeps the threshold value because it cannot guarantee how much portion of observed traffic is legitimate traffic.…”
Section: Attack Emulationmentioning
confidence: 99%
See 1 more Smart Citation