Detecting pulsing denial-of-service attacks with nondeterministic attack intervals

  • Authors:
  • Xiapu Luo;Edmond W. W. Chan;Rocky K. C. Chang

  • Affiliations:
  • Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, SAR, Hong Kong;Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, SAR, Hong Kong;Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, SAR, Hong Kong

  • Venue:
  • EURASIP Journal on Advances in Signal Processing - Special issue on signal processing applications in network intrusion detection systems
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard ismore effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).