Signal Processing and Information Technology. First International Joint Conference, SPIT 2011 and IPC 2011, Amsterdam, The Netherlands, December 1-2, 2011, Revised Selected Papers

Research Article

DDoS Attack Detection through Flow Analysis and Traffic Modeling

Download
422 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-32573-1_14,
        author={J. Udhayan and T. Hamsapriya and N. Vasanthi},
        title={DDoS Attack Detection through Flow Analysis and Traffic Modeling},
        proceedings={Signal Processing and Information Technology. First International Joint Conference, SPIT 2011 and IPC 2011, Amsterdam, The Netherlands, December 1-2, 2011, Revised Selected Papers},
        proceedings_a={SPIT \& IPC},
        year={2012},
        month={10},
        keywords={DDoS Zombie Goodput Throughput Botnet Flash Crowd},
        doi={10.1007/978-3-642-32573-1_14}
    }
    
  • J. Udhayan
    T. Hamsapriya
    N. Vasanthi
    Year: 2012
    DDoS Attack Detection through Flow Analysis and Traffic Modeling
    SPIT & IPC
    Springer
    DOI: 10.1007/978-3-642-32573-1_14
J. Udhayan1,*, T. Hamsapriya2,*, N. Vasanthi3,*
  • 1: Dr. NGP Institute of Technology
  • 2: PSG College of Technology
  • 3: Park College of Engineering & Technology
*Contact email: udhayangodwin@gmail.com, hamsapriya.t@gmail.com, vasanti.au@gmail.com

Abstract

DDoS attack is the formidable cyber warfare of 20 century. Lot of research has already been taking place to mitigate DDoS attack. However DDoS attack still remains a potential threat. This research work considers the model level solution. Having a proper model of the traffic flow will help the administration unit to closely monitor the unusual behavior of the traffic; it will also help to identify the flash crowd which is the occasional accumulation of legitimate traffic. Hence in this paper, the normal traffic behavior is modeled, with the help of that the abnormal traffic which is evident during the DDoS attack is detected. Then the methodology to do the flow specific detection to segregate attack flow from the normal flow is discussed. Finally the possibility to curb the attack from the various hops is discussed.