Day 13: How can we improve DDoS/DoS detection rate?
Hey guys! Today, lets explore some ideas to make our architecture detect DDoS better. Currently, we are using entropy based algorithm to set the threshold for decide how to handle the packet. To make this architecture handle the detection more dynamically we need to make it learn the patterns of network flows. To make the architecture robust, we need to make it more accurate in drawing the fine line between anomalous and normal behavior.
How?? .... *Machine Learning* it is! Lets explore the buzz word more deeply, and do some literature survey. Each day let's cover a more recent paper than the previous day.
First on the list is An Impact Analysis: Real Time DDoS Attack Detection and Mitigation using Machine Learning
This paper consists of an online monitoring system(OMS), spoofed traffic detection followed by interface based rate limiting at the network layer.
How?? .... *Machine Learning* it is! Lets explore the buzz word more deeply, and do some literature survey. Each day let's cover a more recent paper than the previous day.
First on the list is An Impact Analysis: Real Time DDoS Attack Detection and Mitigation using Machine Learning
![]() |
Proposed architecture of the online monitoring system. |
- The OMS employs passive monitoring so that normal functioning of the network is not being disturbed avoiding additional overheads.
- The major objective of spoofed IP classifier is to detect spoofed traffic by constructing legitimate records with IP and the relevant hop count to the victim in non-attack mode.
- Hop count inspection algorithm : Modern operating system uses set of default values as the initial TTL value which is treated as stored Hop count. Hop-count of the incoming packet is calculated by subtracting the obtained TTL (Tfi) from initial TTL(Tin). When calculated value (Hco) equals stored value (Hst), then the source is considered as legitimate, else it is considered as spoofed.
- HCF - SVM : After training the SVM model for a few weeks, a normal behavior user profile is built.
Based on the assumption that, attackers try to overwhelm the victim by denying service to legitimate users, it becomes very essential to rate limit the attack traffic. The attackers causing high traffic aggregates are subjected to traffic limit at the network layer using Interface based Rate Limiting (IBRL) algorithm
The test bed architecture includes :
- Four attacking nodes to generate DDoS attack against the victim node with TFN(Tribe Flood Network) tool that involve flooding (TCP SYN, SMURF, UDP and ICMP).
- The incoming packets from these nodes are collected using tshark.
- Labeled training dataset had a 3:2 attack:normal instance ratio.
- The features considered were IP address and TTL values.
The results obtained showed that the proposed model had a better True positive rate and lesser misclassification rate than Decision tree and Random Forest.
Tomorrow lets explore a more recent paper(2018) that used SVM to detect DDoS.
Happy learning! :)
Please consider that each DOS attack packet might come with a different src IP and thus any ML technique should not depend too much on it.
ReplyDelete