Automatic control method of DDoS defense policy through the monitoring of system resource

  • Authors:
  • Daewon Kim;ByoungKoo Kim;Ikkyun Kim;Jintae Oh;Jongsoo Jang;Hyunsook Cho

  • Affiliations:
  • Electronics and Telecommunications Research Institute, Daejeon, South Korea;Electronics and Telecommunications Research Institute, Daejeon, South Korea;Electronics and Telecommunications Research Institute, Daejeon, South Korea;Electronics and Telecommunications Research Institute, Daejeon, South Korea;Electronics and Telecommunications Research Institute, Daejeon, South Korea;Electronics and Telecommunications Research Institute, Daejeon, South Korea

  • Venue:
  • AICT'11 Proceedings of the 2nd international conference on Applied informatics and computing theory
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

In these day, we obtain various information through internet services and the distributed denial-of-service (DDoS) attacks for threatening the services are socially and economically serious threats. Recently, the attacks that occurred in July 2009 significantly damaged to the major internet services of countries such as South Korea. Due to the seriousness of DDoS attacks, these have been researched in a variety of ways in academies and industries to protect the internet services. However, the existing defense methods have the fundamental limitation that can be vulnerable to the unknown DDoS attacks of new traffic pattern to avoid the methods because the methods apply the defense policies of fixed thresholds that are mainly determined by the learning of traffic volume. Thus, whenever the new DDoS attacks are occurred, the damage is also repeated by the attacks. To overcome the problem caused by the fixed threshold, the paper introduces the automatic control method of defense policy against the DDoS attacks through the monitoring of current system resources. We focused on the fact that the usage ratios of various system resources show the abnormal statuses of server if the service failure of server is occurred by that attacks that were not blocked by current defense policies. Our method measures the usage changes of system resources and detects the abnormal situations and automatically adjusts current defense policies in conjunction with the strength of change. As a result, the DDoS attacks are gradually mitigated by the automatic threshold controlling of our method.