Javascript must be enabled to continue!
On the inference and prediction of DDoS campaigns
View through CrossRef
AbstractThis work proposes a distributed denial‐of‐service (DDoS) inference and forecasting model that aims at providing insights to organizations, security operators, and emergency response teams during and after a DDoS attack. Specifically, our work strives to predict, within minutes, the attacks' features, namely intensity/rate (packets/second) and size (estimated number of used compromised machines/bots). The goal is to understand the future short‐term trend of the ongoing DDoS attack in terms of those features and thus provide the capability to recognize the current as well as future similar situations and hence appropriately respond to the threat. Further, our work aims at investigating DDoS campaigns by proposing a clustering approach to infer various victims targeted by the same campaign and predicting related features. Our analysis employs real darknet data to explore the feasibility of applying the inference and forecasting models on DDoS attacks and evaluate the accuracy of the predictions. To achieve our goal, our proposed approach leverages a number of time series and fluctuation analysis techniques, statistical methods, and forecasting approaches. The extracted inferences from various DDoS case studies exhibit a promising accuracy reaching at some points less than 1% error rate. Further, our approach could lead to a better understanding of the scale, speed, and size of DDoS attacks and generates inferences that could be adopted for immediate response and mitigation. Moreover, the accumulated insights could be used for the purpose of long‐term large‐scale DDoS analysis. Copyright © 2014 John Wiley & Sons, Ltd.
Title: On the inference and prediction of DDoS campaigns
Description:
AbstractThis work proposes a distributed denial‐of‐service (DDoS) inference and forecasting model that aims at providing insights to organizations, security operators, and emergency response teams during and after a DDoS attack.
Specifically, our work strives to predict, within minutes, the attacks' features, namely intensity/rate (packets/second) and size (estimated number of used compromised machines/bots).
The goal is to understand the future short‐term trend of the ongoing DDoS attack in terms of those features and thus provide the capability to recognize the current as well as future similar situations and hence appropriately respond to the threat.
Further, our work aims at investigating DDoS campaigns by proposing a clustering approach to infer various victims targeted by the same campaign and predicting related features.
Our analysis employs real darknet data to explore the feasibility of applying the inference and forecasting models on DDoS attacks and evaluate the accuracy of the predictions.
To achieve our goal, our proposed approach leverages a number of time series and fluctuation analysis techniques, statistical methods, and forecasting approaches.
The extracted inferences from various DDoS case studies exhibit a promising accuracy reaching at some points less than 1% error rate.
Further, our approach could lead to a better understanding of the scale, speed, and size of DDoS attacks and generates inferences that could be adopted for immediate response and mitigation.
Moreover, the accumulated insights could be used for the purpose of long‐term large‐scale DDoS analysis.
Copyright © 2014 John Wiley & Sons, Ltd.
Related Results
A Framework for Detecting Distributed Denial of Services Attack in Cloud Enviorment using Machine Learning Techniques
A Framework for Detecting Distributed Denial of Services Attack in Cloud Enviorment using Machine Learning Techniques
Distributed Denial of Service (DDoS) persists in Online Applications as One of those significant threats. Attackers can execute DDoS by the more natural steps. Then with the high p...
Detection & Mitigation of DDOS Attack
Detection & Mitigation of DDOS Attack
Abstract
The DDoS (Distributed Denial of Service) attack is a type of Cyberattack in which multiple attackers aim to attack different network resources like a server or a w...
Timely Detection of DDoS Attacks with Dimenstionality Reduction
Timely Detection of DDoS Attacks with Dimenstionality Reduction
Due to the interconnectedness and exponential proliferation of IoT devices, the technology is more susceptible to network attacks like Distributed Denial of Service (DDoS), which d...
Designing of Blockchain-Based Cyber Security for the Protection of Distributed Denial of Service (DDoS) Attacks on Client-Server Networks
Designing of Blockchain-Based Cyber Security for the Protection of Distributed Denial of Service (DDoS) Attacks on Client-Server Networks
Abstract
The complexity and difficulty of the ongoing and unstoppable cybercrimes in the traditional or conventional Artificial Intelligence (AI) system create the worst pr...
A lightweight machine learning approach for DDoS detection and classification
A lightweight machine learning approach for DDoS detection and classification
Abstract
With the development of network technology, more and more protocols and devices are used in DDoS reflection and exploitation attacks. Different DDoS attacks often ...
Mitigating DDoS Attacks in Cloud Networks
Mitigating DDoS Attacks in Cloud Networks
Distributed Denial of Service (DDoS) attacks represent a significant and growing threat to cloud networks, capable of causing extensive service disruptions and substantial financia...
MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS
MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS
Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease o...
IMPLEMENTASI HONEYPOT DAN PORT KNOCKING DALAM MENDETEKSI SERANGAN DDoS ATTACK PADA SERVER JARINGAN
IMPLEMENTASI HONEYPOT DAN PORT KNOCKING DALAM MENDETEKSI SERANGAN DDoS ATTACK PADA SERVER JARINGAN
Sistem keamanan jaringan semakin hari kian makin berkembang, begitu pula serangan pada sistem jaringan yang berbeda-beda metode dan perkembangannya, khususnya pada server yang menj...

