An orchestration approach for unwanted Internet traffic identification

  • Authors:
  • Eduardo Feitosa;Eduardo Souto;Djamel H. Sadok

  • Affiliations:
  • Informatics Center, Federal University of Pernambuco, 50740-540 Recife Pernambuco, Brazil and Institute of Computing, Federal University of Amazonas, 69077-000 Manaus Amazonas, Brazil;Institute of Computing, Federal University of Amazonas, 69077-000 Manaus Amazonas, Brazil;Informatics Center, Federal University of Pernambuco, 50740-540 Recife Pernambuco, Brazil

  • Venue:
  • Computer Networks: The International Journal of Computer and Telecommunications Networking
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

A simple examination of Internet traffic shows a wide mix of relevant and unwanted traffic. The latter is becoming increasingly harmful to network performance and service availability, while often consuming precious network and processing resources. Coordinated attacks, such as distributed denial-of-services (DDoS), large-scale scans, and worm outbreaks, occur in multiple networks simultaneously and become extremely difficult to detect using an individual detection engine. This paper presents the specification of a new orchestration-based approach to detect, and, as far as possible, to limit the actions of these coordinated attacks. Core to the proposal is a framework that coordinates the receiving of a multitude of alerts and events from detectors, evaluates this input to detect or prove the existence of anomalies, and consequently chooses the best action course. This framework is named Orchestration-oriented Anomaly Detection System (OADS). We also describe an OADS prototype implementation of the proposed infrastructure and analyze initial results obtained through experimentation with this prototype.