Detecting and Tracing DDoS Attacks in the Traffic Analysis Using Auto Regressive Model(Traffic Measurement and Analysis)(<Special Section>New Thechnologies and their Applications of the Internet)
スポンサーリンク
概要
- 論文の詳細を見る
In recent years, interruption of services large-scale business sites and Root Name Servers caused by Denial-of-Service (DoS) attacks or Distributed DoS (DDoS) attacks has become an issue. Techniques for specifying attackers are, thus important. On the other hand, since information on attackers' source IP addresses are generally spoofed, tracing techniques are required for DoS attacks. In this paper, we predict network traffic volume at observation points on the network, and detect DoS attacks by carefully examining the difference between predicted traffic volume and actual traffic volume. Moreover, we assume that the duration time of an attack is the same at every observation point the attack traffic passes, and propose a tracing method that uses attack duration time as a parameter. We show that our proposed method is effective in tracing DDoS attacks.
- 社団法人電子情報通信学会の論文
- 2004-12-01
著者
-
Nemoto Y
Graduate School Of Information Sciences (gsis) Tohoku University
-
Kato Nei
Graduate School Of Information Sciences (gsis) Tohoku University
-
Nemoto Yoshiaki
Graduate School Of Information Science Tohoku University
-
Waizumi Yuji
Graduate School Of Information Sciences (gsis) Tohoku University
-
UCHIYAMA Yuichi
NTT DATA CORPORATION
-
Uchiyama Y
Ntt Data Corporation
関連論文
- On the Effect of Mobility on Reliable Topology Control in Ad-hoc Networks
- Characterization of Packet Losses and Delays in Multi-Layered Satellite Networks Over an Efficient Routing Scheme
- A secure and robust framework of service level specification for next generation wireless networks (ユビキタス・センサネットワーク)
- Problems in Management Information Retrieval for High-Speed Networks and a Proposed Solution (Special Issue on Multimedia on Demand)
- B-11-10 A Study on QoS guarantee for Multiclass Traffic
- Hand-written Character Recognition System Using Uniform Division of Training Samples on subspace Method
- Performance evaluation of TCP over hybrid satellite/MANET networks (衛星通信)
- Capacity Design of Guaranteed-QoS VPN
- A Satellite Selection Method for Walker Delta LEO Satellite Networks(Recent Fundamental Technologies for Broadband Satellite Communications)
- A New Coding Scheme for Infrared ASK Communication Systems Which Have Zero-Spectrum Points within the Main-Lobe Region (Joint Special Issue on Recent Progress in Optoelectronics and Communications)
- A New Coding Scheme for Infrared ASK Communication Systems Which Have Zero-Spectrum Points within the Main-Lobe Region (Joint Special Issue on Recent Progress in Optoelectronics and Communications)
- A Fundamental Study on Effect of Contact Condition for Electromagnetic Noise at Copper-Carbon Electrodes (Special Issue on Electromechanical Devices and Their Materials)
- Usage Parameter Control Scheme for ATM Networks : Markovian State-Dependent Approach
- High Accuracy Recognition of ETL9B Using Exclusive Learning Neural Network-II : ELNET-II (Special Issue on Character Recognition and Document Understanding)
- ELB in IP/NGEO Satellite Constellations : Issues and Solutions(Advanced Technology-I)
- A Study of Gaussian Activation Function Based Modular Neural Network for Alternative-Style Handwritten Characters Recognition System
- Characterization of Packet Losses and Delays in Multi-Layered Satellite Networks Over an Efficient Routing Scheme
- Detecting and Tracing DDoS Attacks in the Traffic Analysis Using Auto Regressive Model(Traffic Measurement and Analysis)(New Thechnologies and their Applications of the Internet)
- High Speed and High Accuracy Rough Classification for Handwritten Characters Using Hierarchical Learning Vector Quantization
- A Handprinted Character Recognition System Using Image Transformation Based on Partial Inclination Detection (Special Issue on Character Recognition and Document Understanding)
- A Traffic Congestion Avoidance Scheme for LEO Satellite Networks by Using Traffic Detour Technique(System Engineering-II)
- B-6-128 Admission Control and Resource Allocation for Hierarchical-Generalized Processor Sharing System
- Congestion Prediction Based Load Balancing in IP/LEO Satellite Networks(Satellite Network)