Detecting DDoS attacks with passive measurement based heuristics

  • Authors:
  • C. Siaterlis;B. Maglaris

  • Affiliations:
  • Network Manage. & Optimal Design (NETMODE) Lab, Nat. Tech. Univ. of Athens, Greece;Network Manage. & Optimal Design (NETMODE) Lab, Nat. Tech. Univ. of Athens, Greece

  • Venue:
  • ISCC '04 Proceedings of the Ninth International Symposium on Computers and Communications 2004 Volume 2 (ISCC"04) - Volume 02
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Network traffic anomalies such as distributed denial of service attacks or the propagation of a new worm are hard to detect on noncongested ISP backbone links. The research community hasn't managed to offer reliable detection metrics that can be implemented with the current technology constraints to network administrators yet. In this work we explore and evaluate the effectiveness of several potential heuristics in detecting flooding attacks. Our observations are based on a daily network traffic analysis for a period longer than 3 months and on more than 40 experiments that were conducted with the use of common DDoS tools in the production network of an academic ISP. The data analyzed are based on different types of passive measurements that are available today to ISP's. We identify multiple effective detection metrics that could give network administrators insight to malicious activities passing through their networks.