An Overview of DoS and DDoS Attack Detection Techniques

Author(s):  
Mateusz Gniewkowski
2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Bin Jia ◽  
Xiaohong Huang ◽  
Rujun Liu ◽  
Yan Ma

The explosive growth of network traffic and its multitype on Internet have brought new and severe challenges to DDoS attack detection. To get the higher True Negative Rate (TNR), accuracy, and precision and to guarantee the robustness, stability, and universality of detection system, in this paper, we propose a DDoS attack detection method based on hybrid heterogeneous multiclassifier ensemble learning and design a heuristic detection algorithm based on Singular Value Decomposition (SVD) to construct our detection system. Experimental results show that our detection method is excellent in TNR, accuracy, and precision. Therefore, our algorithm has good detective performance for DDoS attack. Through the comparisons with Random Forest, k-Nearest Neighbor (k-NN), and Bagging comprising the component classifiers when the three algorithms are used alone by SVD and by un-SVD, it is shown that our model is superior to the state-of-the-art attack detection techniques in system generalization ability, detection stability, and overall detection performance.


In this paper, we present a review of on hand IDS (Intrusion Detection Techniques) for DDoS assaults. Interruption discovery framework is a well known and computationally costly task. We additionally clarify the essentials of interruption identification framework. We represent the present methodologies for Intrusion Detection framework. From the expansive assortment of proficient procedures that have been created we will look at the most significant ones. Their qualities and shortcomings are likewise researched. For reasons unknown, the conduct of the calculations is substantially more comparative as not out of the ordinary.


2019 ◽  
Vol 8 (3) ◽  
pp. 4990-4993

Wireless sensor network(WSN) uses in many distinct applications including real time event detection. Sensor nodes(SN) have limited energy associated with them that is required to be conserved. Once all the energy of the sensors is drained, then network dies. In addition sensor nodes are exposed to everyone hence SN is susceptible to attacks. Distributed denial of service attack is one of the common attacks caused by malicious attacker causing congestion and decay in lifetime of the network. DDOS attack floods network with the bogus requests. This causes the legitimate request to be avoided by the server due to lack of resources. Detection and prevention of such attacks thus becomes critical. This paper provides study of techniques used to detect DDOS attack along with suggest modification for improving classification accuracy in the detection techniques. in addition this paper also highlight other metrics such as mean time to failure and mean time between failure for improving the detection process.


on each successive day, the DDoS attacks are increasing, improving and becoming more critical than ever before. In 2018, CISCO predicted that DDoS attack traffics may reach to 3.1 billion during 2021. Bit and Piece DDoS attack is an emerging attacking technique was found and reported by Nexusguard. This attack mainly targets the communication service providers and it injects unwanted junk information in to the legitimate traffic and thus bypasses the detection techniques. This work is aimed to propose a novel approach for detecting bit and piece attack using statistical metrics. Here, the packet flow is monitored at every second and the variations in the data flows easily identified as an attack.


Author(s):  
Shanshan Yu ◽  
Jicheng Zhang ◽  
Ju Liu ◽  
Xiaoqing Zhang ◽  
Yafeng Li ◽  
...  

AbstractIn order to solve the problem of distributed denial of service (DDoS) attack detection in software-defined network, we proposed a cooperative DDoS attack detection scheme based on entropy and ensemble learning. This method sets up a coarse-grained preliminary detection module based on entropy in the edge switch to monitor the network status in real time and report to the controller if any abnormality is found. Simultaneously, a fine-grained precise attack detection module is designed in the controller, and a ensemble learning-based algorithm is utilized to further identify abnormal traffic accurately. In this framework, the idle computing capability of edge switches is fully utilized with the design idea of edge computing to offload part of the detection task from the control plane to the data plane innovatively. Simulation results of two common DDoS attack methods, ICMP and SYN, show that the system can effectively detect DDoS attacks and greatly reduce the southbound communication overhead and the burden of the controller as well as the detection delay of the attacks.


Sign in / Sign up

Export Citation Format

Share Document