Adaptive distributed mechanism against flooding network attacks based on machine learning

  • Authors:
  • Josep L. Berral;Nicolas Poggi;Javier Alonso;Ricard Gavaldà;Jordi Torres;Manish Parashar

  • Affiliations:
  • Technical University of Catalonia (UPC), Barcelona, Spain;Technical University of Catalonia (UPC), Barcelona, Spain;Barcelona Supercomputing Center (BSC) - Technical University of Catalonia (UPC), Barcelona, Spain;Technical University of Catalonia (UPC), Barcelona, Spain;Barcelona Supercomputing Center (BSC) - Technical University of Catalonia (UPC), Barcelona, Spain;Rutgers University, New Jersey, NJ, USA

  • Venue:
  • Proceedings of the 1st ACM workshop on Workshop on AISec
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Adaptive techniques based on machine learning and data mining are gaining relevance in self-management and self-defense for networks and distributed systems. In this paper, we focus on early detection and stopping of distributed flooding attacks and network abuses. We extend the framework proposed by Zhang and Parashar (2006) to cooperatively detect and react to abnormal behaviors before the target machine collapses and network performance degrades. In this framework, nodes in an intermediate network share information about their local traffic observations, improving their global traffic perspective. In our proposal, we add to each node the ability of learning independently, therefore reacting differently according to its situation in the network and local traffic conditions. In particular, this frees the administrator from having to guess and manually set the parameters distinguishing attacks from non-attacks: now such thresholds are learned and set from experience or past data. We expect that our framework provides a faster detection and more accuracy in front of distributed flooding attacks than if static filters or single-machine adaptive mechanisms are used. We show simulations where indeed we observe a high rate of stopped attacks with minimum disturbance to the legitimate users.