Вы находитесь на странице: 1из 11

Computer Networks 48 (2005) 235–245

www.elsevier.com/locate/comnet

Real-time detection of distributed denial-of-service


attacks using RBF networks and statistical features
Dimitris Gavrilis, Evangelos Dermatas *

Department of Electrical Engineering and Computer Technology, University of Patras, Kato Kastritsi, 26500 Patras, Greece

Received 17 July 2003; received in revised form 12 April 2004; accepted 6 August 2004
Available online 21 December 2004

Responsible Editor: Z.-L. Zhang

Abstract

In this paper we present and evaluate a Radial-basis-function neural network detector for Distributed-Denial-of-Ser-
vice (DDoS) attacks in public networks based on statistical features estimated in short-time window analysis of the
incoming data packets. A small number of statistical descriptors were used to describe the DDoS attacks behaviour,
and an accurate classification is achieved using the Radial-basis-function neural networks (RBF-NN). The proposed
method is evaluated in a simulated public network and showed detection rate better than 98% of DDoS attacks using
only three statistical features estimated from one window of data packets of 6 s length. The same type of experiments
were carried out on a real network giving significantly better results: a 100% DDoS detection rate is achieved followed
by a 0% of false alarm rate using different statistical descriptors and training conditions for the RBF-NN.
Ó 2004 Elsevier B.V. All rights reserved.

Keywords: Intrusion detection; Denial-of-service attacks; RBF networks; Neural networks; Computer security

1. Introduction lars. Major commercial web sites have been dis-


abled for several hours due to such attacks. The
In recent years there has been a sudden increase DDoS attacks usually do not take advantage of
of Network-based intrusion and Distributed De- some security flaw but instead they make legiti-
nial of Service (DDoS) attacks. Especially after mate use of a service until all the resources that
the year 2000 the problem has grown enormously, this service uses are exhausted [14]. The attacker
increasing the costs of losses to billions of US dol- increases the number of network processes requir-
ing significant computer resources: CPU load,
*
Corresponding author. Tel.: +30 261 099 6476.
memory, disk space, and network bandwidth. This
E-mail addresses: gavrilis@george.wcl2.ee.upatras.gr (D. characteristic of those attacks makes them difficult
Gavrilis), dermatas@george.wcl2.ee.upatras.gr (E. Dermatas). to detect especially in large commercial networks

1389-1286/$ - see front matter Ó 2004 Elsevier B.V. All rights reserved.
doi:10.1016/j.comnet.2004.08.014
236 D. Gavrilis, E. Dermatas / Computer Networks 48 (2005) 235–245

such as yahoo.com or amazon.com where they In [1], Mell et al. describes an intrusion detec-
serve hundreds or maybe thousands of users per tion system (IDS) to become resistant to flooding
minute. When the flow of packets on a network DoS attacks using a combination of techniques:
suddenly increases we cannot be certain that it is the critical IDS components are made invisible to
because of a DDoS attack that is in progress or be- the attacker, critical IDS components are made
cause too many users happen to use that service at adaptive to flooding DoS attacks. The authors
that time [16]. Commercial DDoS detection sys- do not prevent an attacker from launching attacks
tems [13,16–19] have high false-alarm rates, pro- but instead makes the significant targets invisible
ducing hundreds of false alarms per day because which forces the attacker to fire blindly.
it is often difficult to select manually the identifica- Recently neural network architectures for intru-
tion conditions for a great number of attacks and sion detection have been proposed [12,20,22,21]. A
their variants [17–19,2]. backpropagation neural network (multilayer per-
ceptron) has been presented by Ryan et al. [3].
1.1. Network-based intrusion and DDoS attacks The neural network is trained to identify users
based on what commands they use during a day.
A great number of methods for recognizing In a system of 10 users and a dataset collected
intrusion and DDoS attacks have already been for 12 days, the neural network was 96% accurate
presented (4–25). In [4], the Articon-Intergralis in detecting anomalous behaviour, with a false
group discusses the specification and test process alarm of 7%. In [7] an adaptive intrusion detection
of Intrusion Detection Systems and proposed a system for TCP/IP networks is described based on
detailed topology, machines and attacks scenarios neural networks. The training process is based on
that were used to make the assessment. The Net- previous well-known intrusion profiles, and the
work Intrusion Detection System technology is adaptation capabilities is realized by re-training
described in [5], comparing the most popular the neural network using new profiles. The system
methods: Pattern-searching and protocol analysis. is based on the fact that an intrusion can be de-
The protocol analysis usually can be used to detect tected from an analysis of predetermined models
the true signature of the intrusion when it is hidden for both normal and intrusion actions. The best
in the protocol. In this case most of the pattern- performance of approximately 95% has been
search methods fail to detect the intrusion. A com- achieved using a two hidden-layer perceptron neu-
mon protocol analysis is based on a decision tree. ral network (20-5-1 neurons per layer) trained by
The computational effort of the tree search in- the error backpropagation algorithm.
creases significantly in case of intrusion or DDoS The well-known K-nearest Neighbor Classifier
attacks. In this case the Network Intrusion Detec- KNNC has been evaluated in [8], to categorize a
tion System would overload and eventually process into normal or intrusive class using system
shutdown. calls over each program execution. The computa-
An intrusion detection approach has been pro- tional load of the KNNC is partially faced by pro-
posed by Me (in [6]) based on predefined attack cessing the restricted set of system calls (less than
scenarios and using a genetic algorithm. Taking 100 in DARPA BSM data), while a typical Pat-
into account that pattern-searching methods are tern-searching intrusion detection system in shell
NP-Complete problems, a genetic algorithm is level could have over 15,000 unique words. The
used to reduce the computations in Ôthe security KNNC calculates the similarity between the new
audit trail analysis problemÕ. The experimental process and each training process instance using
evaluation showed successful detection of the at- the assumption that the process belonging to the
tacks after 20 generations, giving a detection rate same class will cluster together in the vector space.
of 99% after 100 generations. If the attacks coded The KNNC is applied to the 1998 DARPA data.
in the Attacks–Events matrix grows, the final gen- The audit data were collected on a traffic simulator
eration number has to increase to keep the detec- of an Air Force Local Area Network. The system
tionÕs quality at the same level. is extensively evaluated giving an excellent detec-
D. Gavrilis, E. Dermatas / Computer Networks 48 (2005) 235–245 237

tion rate. When the number of simultaneously pro- successfully both in UDP and ICMP protocols.
cesses increases, the detector is computationally In a great number of Internet sites, DDoS attack
expensive for real-time implementation in some tools are available.
computers. In the same dataset (1998 DARPA) a After an analysis of the available tools that
statistical traffic model for detecting novel attacks perform DDoS attacks, it is found that a DDoS
has been presented in [15]. The model effectiveness attack has the following characteristics:
in discriminating normal connections from DoS
attacks is quantified by plotting the Receiver (a) The source IP of the packets is set random.
Operating Characteristics curves. The kolmogo- (b) The source and the destination port of the
rov–Smirnov test is used as a classifier between packets is set random.
the normal and the attack conditions by process- (c) Some of the flags (URG, ACK), fragmenta-
ing the statistical differences of the number of tion, TCP options, TTL and the clientÕs
bytes from the responder, and the byte ratio re- SEQ number are assigned by a pseudorandom
sponder–originator. generator.
Recently, Streilein et al. [21] presents neural net-
work classifiers based on the multilayer perceptron In most tools, multiple instances of the applica-
for accurately detection of several classes of tion (usually residing on multiple machines), com-
attacks including stealthy probes and novel municate with each other and coordinate during
DDoS attacks. The neural-based detection system the attack. The packets can be sent to the target(s)
achieves a recognition rate of 100% with a false in bursts or in a continuous flow.
alarm of 0.1% when tested against stealthy attacks
in the DARPA 1999 IDS Evaluation data. From
the original extended set of features, the authors 2. System innovations
eliminate the least effective, proposing a minimal
set of five only features. Every robust DDoS detection system must sat-
isfy some important specifications: (a) very high
1.2. The DDos attacks detection rates with minimal false alarm rates,
(b) real-time detection with low memory and
As reported in [23], where a structural approach cpu-time requirements, (c) invariant in evolution-
of the DDoS attacks and the defense mechanisms ary trends in DDoS attacks, network topology
can be found, DDoS attacks can be classified in and the variations of the normal data-exchange
five categories. The most important are the TCP rates, (d) minimum interference of the DDoS
Flooding, UDP Flooding, ICMP Flooding and detector in the traffic. In the direction of building
Smurf attacks. The first three attempt to flood a efficient DDoS detectors, we present a system pro-
network with TCP [10,11], UDP and ICMP traffic viding a number of important innovations:
respectively so as to exhaust the networkÕs or the
serverÕs resources. The latter works in a different (a) A small and a robust number of normalized
manner and does not pose a threat when certain statistical features is used for monitoring the
modifications are made in the networkÕs devices. statistical properties of the data exchange
The DoS attacks performed using ICMP messages packets in the network. The computational
usually succeed because the victim host does not effective features set is used to recognize in
maintain enough information on the messages real-time the normal network traffic from sud-
communication [9]. However, with the appropriate denly increased packet flow from a DDoS
modifications, it can be prevented. The most attack in very short time intervals.
important work is concentrated in the first type (b) The features space present reduced variance
of attack because TCP is the most widely used pro- in different DDoS attacks giving very high
tocol and WWW is the most widely used service on detection rates, which is almost independent
the Internet. The same mechanism can be applied of the DDoS implementation details.
238 D. Gavrilis, E. Dermatas / Computer Networks 48 (2005) 235–245

(c) Even in the case of very-fast networks, accu- 16 bits are adequate in estimating the SEQ num-
rate estimation of the statistical features can bersÕ feature. The upper 16 bits can store the nec-
be obtained by processing a subset of the essary information in an array of 65,535 bytes
packets transferred on the network. long.
(d) Even in the case of complex distribution of The statistics gathered for each timeframe are
the features vector, the effective Radial- the frequency of occurence for each of the follow-
Basis-Function neural network (RBF-NN) is ing six flags to be set: Syn, Ack, Fin, Psh, Urg, Rst.
used to recognize DDoS attacks from the nor- In extended experiments it has been found that
mal traffic. The well-developed theoretical these flags contain significant information related
analysis of the RBF-NN [24] introduces a to the presence of a DDoS attack. The Source IP
number of significant advantages over multi- Address is not used in the recognition process,
layer perceptrons. The RBF-NN detector is even if it provides significant information, because
a two layer neural network. In the first (hid- it requires substantial amount of computing power
den) layer the neurons implement a radial to store the individual addresses. Additionally, it is
function while the output neurons implement also decided not to use the packet length informa-
a weighted sum of hidden neuron outputs. tion because it would make the DDoS detector
The excellent approximation properties of system service specific (e.g. only for www). In the
the RBF-NN allows for complex non-linear same experiments it is showed that other data
mapping by modifying only the number of transferred by the TCP/IP packets, such as the
hidden neurons, which simplifies the compu- Time-to-Live field, do not contain information
tational complexity in both the activation related to the presence of a DDoS attack.
and training process. Moreover, extremely Features estimator. The frequency of flags and
faster learning rates, smaller approximation the number of the distinct values for the Source
errors with extremely low probability to con- Ports, SEQ number, and Window size are esti-
verge in local minima has been measured in a mated for each timeframe. The statistical features
great number of applications. for each timeframe for the six flags are the proba-
bility of the flag to be set. The number of the dis-
tinct values is divided by the total number of
packets for a certain timeframe for the SEQ num-
3. System description ber, the Window Size and the Source Port.
DDoS detector. The nine-features vector were
The system consists of three sequentially con- used to activate a two-output RBF network at
nected modules: each timeframe. The most active output neuron
Data collector. A sniffer captures the following detects the presence of a DDoS attack or charac-
data fields for each packet: Source Port, SEQ terizes the timeframe as normal traffic. In the
number of client, Window size, and the Syn, experiments it is shown that a small number of
Ack, Fin, Psh, Urg, Rst flags. The timestamp hidden neurons can be used to achieve high detec-
for each packet is also recorded in order to tion rates of DDoS attacks. Moreover, the RBF-
group the packets into overlapping timeframes. NN classification capabilities are studied using
The number of the distinct Source Ports, and an extremely small input vector containing only
Window size numbers are estimated for each three features.
timeframe. The SEQ number is a 32-bit random
number produced by the client as an identifica-
tion for a certain TCP connection. The estima- 4. The RBF-NN training process
tion of the distinct SEQ numbers requires
significant memory space and computing power. The gathered data were used to create two dif-
Experimental results showed that, although the ferent training scenarios. In the first scenario the
SEQ number varies across clients, the upper DDoS detector is trained using normal www and
D. Gavrilis, E. Dermatas / Computer Networks 48 (2005) 235–245 239

network using a linux based sniffer placed on a


monitoring host, which is based on the popular
libpcap library and while in capture mode a filter
was used to monitor traffic for the www service
only. In the second step, the captured packets for
Fig. 1. Time frames and a DDoS attack in the bold line: some scenario are grouped into timeframes and
normal traffic (0), DDoS and normal traffic (1). the statistical features for each timeframe and
overlaptime sizes are produced. The data were
grouped into 18 different timeframes ranging from
pure DDoS traffic. In the second scenario the pure 5 to 18 s, with an overlap time from 1 to 6 s. In the
DDoS traffic was replaced by the data collected final step, the features data were used to train and
when the DDoS hits the server which serves the evaluate the RBF-NN.
normal traffic. In both training scenarios different The DDoS attack was carried out using the pro-
normal and combined traffic is used to estimate gram Tribe Flood Network (TFN2k). The sniffer
the RBF-NN efficiency, as shown in Fig. 1. recorded an actual attack, normal www requests
The networkÕs efficiency was measured for a dif- only and traffic generated only by the TFN2k pro-
ferent number of hidden neurons ranging from 1 gram. It is possible that the sniffer could ‘‘miss’’
to 20. A mixture of Gaussian functions was used some packets especially when the packet rate is
as the RBFÕs non-linear function. The mean and very high. The missing data does not influence
variance for the Gaussian function was estimated the systemÕs performance due to the statistical
using the K-means clustering algorithm [24]. It is nature of the features.
well-known that the K-meansÕ initial centers signif-
icantly influences the quality of the training pro- 5.1. The features set
cess. A good selection of the initial centers led to
significantly better classification rates for different Two different features sets were used to evaluate
network topologies. Therefore, the K-means cen- the RBF-NN detection efficiency depending on the
ters which minimizes the quantization error from number of features used to build the input vector.
the training data are selected from a set of multiple In many cases the original set of 9 statistical fea-
local minimum set of centers. Multiple local mini- tures surpassed the 98% of correct classification.
mum solutions are created by applying the K- During experiments, it is also noticed that many
means algorithm using different initialization. of the fields of the input vector such as the Time-
During the center re-estimation process of the to-Live, the Window Size and some of the Flags
K-means algorithm the variance of some flags did not contain sufficient information to contrib-
was zero (e.g. RST, URG flags) or very close to ute in the DDoS detection process. This along with
zero. In this case, the algorithm fails to continue the excellent system performance led to an evalua-
or convergence to an extremely bad local mini- tion using the reduced set of the 3 input vector
mum, decreasing significantly the classification (Source Port, SEQ number, Syn flag). This set of
efficiency of the RBF-NN. To overcome this prob- features can be estimated in real-time using con-
lem, a minimum value for the estimated variance ventional low-cost computing systems. We consid-
was experimentally derived, giving significantly ered those three features to be the most important
better classification rates. except the Source IP Address which we did not use
in order to allow minimum computing resources
in both computational complexity and memory
requirements in the RBF-NN-based DDoS detec-
5. Experimental evaluation tion system. The correct classification rate was
in most cases as close as the 9 features rate. This
The evaluation process is divided in three steps: figure verified the initial assumptions about the
in the first step the packets are captured from the nature of the input fields.
240 D. Gavrilis, E. Dermatas / Computer Networks 48 (2005) 235–245

5.2. The experiments 6. Experimental results on the simulated network

The proposed RBF-NN detector was trained The RBF-NN has better classification rate in
and evaluated in two experiments. the first experiment when the second training sce-
In the first experiment, a 100 Mbps network nario (Sen2) is used to estimate the NN synaptic
was setup and the Web Application Stress Tool weights against the first training scenario (Sen1),
from Microsoft Corp. was used to simulate the cli- as shown in Fig. 2 and 3 where the correct classi-
ents. An entire web site was mirrored on the test fication rate for both features sets (9in-original fea-
server and actual users surfed the site. The users tures vector and 3in-reduced features vector) is
responseÕs, pages they surfed, delay time between plotted for different timeframe sizes. These results
hits etc, are recorded and saved as user profiles are typical in pattern recognition experiments
using the Web Application Stress Tool (a tool that where the second training scenario describes better
sends HTTP requests on a web server using actual the pattern distribution in the features space than
profiles). the training data of the first scenario. In the second
The SEQ numbers and the Source Ports for a scenario simultaneous normal traffic and a DDoS
recorded session did not correspond to the real attack is recorded: the training and the evaluation
ones because they were produced by the same data describe the same type of traffic. In the case
client machine (that simulated thousands of dif- where the overlap time was 2 s (Fig. 2) and the
ferent clients). In order to overcome this prob- RBF-NN is trained with the second dataset, al-
lem, the distinct TCP sessions are recognised most 20% better classification rate is obtained in
and the SEQ and Source Port numbers are regard to the rate obtained by the RBF-NN
modified according to the protocol rules. While trained by the first dataset. In addition, a compar-
parsing the file containing the captured packets, ison between the two figures showed better classi-
each distinct connection is recognised using the fication rates in case where the overlap step is set
information provided by the source port and to 1 s step, giving the best results when the RBF-
the clientÕs SEQ number. After a connection NN is trained by the second dataset.
has been found, a random number is generated In both training datasets, the 3 features RBF-
which replaces the clientÕs SEQ number. The NN is expected to behave worse than the RBF-
new SEQ number is modified in the same way NN processing the 9-features vector. However,
with the old one during data exchange between the experimental results (Figs. 2 and 3) showed
the client and the server thus following the better classification rate for the 3-features vector.
TCP/IP protocol rules. Several experiments were This unexpected behaviour is caused by the
conducted, producing normal www traffic of insufficient number of training examples. In
1 min total length, DDoS traffic of 1 min total regression problems, where a great number of
length and combined traffic of 3 min total unknown parameters are met, the size of the
length. training data must be increased enormously to
In the second experiment, a DDoS attack was obtain sufficient generalization capabilities. In
launched on the main web server of the univer- the case of the 9-features input vector, the num-
sity of Patras central library. This is probably ber of training examples are insufficient to em-
the web server with most hits in the university body generalization capabilities to the synaptic
as it serves over 25.000 users. The recorded pack- weights.
ets for the normal traffic were 78,361 (60 min As the timeframe increases, the correct classifi-
duration). For the DDoS attack were 73,677 cation rate is expected to improve. In general, that
(1 min duration) and for the combined traffic is the case mostly carried out in the experiments
822,655 (6 min duration). During the combined using the training data derived by the first scenario
traffic experiment, in the first 3 min there was (Fig. 4). Classification rates better than 94% were
normal traffic and after the 3rd minute the at- achieved using the complete set of features and
tack started. timeframe sizes greater than 10 s. A totally differ-
D. Gavrilis, E. Dermatas / Computer Networks 48 (2005) 235–245 241

Fig. 2. Correct classification rate for the simulated network and 2 s overlapping step.

Fig. 3. Correct classification rate for the simulated network and 1 s overlapping step.
242 D. Gavrilis, E. Dermatas / Computer Networks 48 (2005) 235–245

Fig. 4. Correct classification rate for the simulated network using the first training scenario.

ent figure is met in case where the RBF-NN is correct classification rate did not fall under 92%
trained using the second scenario training data (16 s timeframe and 2 s step).
(Fig. 5). Generally, the correct classification rate In Fig. 6 the correct classification versus the
decreases when the timeframe size increases. The number of RBF weights are showed. The number
best classification rate of 99% was achieved using of RBF weights that are capable to produce cor-
a 6 s window timeframe and the original set of rect classification rates more than 99%, vary from
9-features vector. A small timeframe is more pref- 70 to 90 and refer to a RBF-NN trained with the
erable in applications because the features estima- second scenario data.
tion module is faster. The DDoS detection errors occurred only at the
Generally, it is easier to achieve the first sce- timeframes where the attack begins or at the time-
nario dataset because the only required informa- frame where the attack ends (Fig. 1, timeframes
tion is normal and pure DDoS traffic data, while no: 5, 43, 75), In these timeframes transition phe-
in the case of the second scenario, a combined traf- nomena distort the statistical features. In time-
fic signature is needed. The best correct classifica- frames 5 and 75 the DDoS starts to hit the
tion rate of 94.5% was achieved using the first network, while in those timeframes some DDoS
scenario data, the original features vector consist- packets remains in the traffic.
ing of 9 components, a 12 s timeframe and 1 s
overlap step. In the same conditions, the DDoS
detection rate was 91.8% when the 3 features vec- 7. Experimental results on the real network
tor is used. In the second scenario the best correct
identification rate was 98.97% (6 s timeframe and In the case of the real network (second experi-
1 s step) for both feature vectors. In any case, the ment), the results are surprisingly better. The iden-
D. Gavrilis, E. Dermatas / Computer Networks 48 (2005) 235–245 243

Fig. 5. Correct classification rate for the simulated network using the second training scenario.

tification rate of the RBF-NN was 100% when the 195 examples, established on the simulated net-
number of hidden neurons are greater than 3, as work. The correct classification rate in all experi-
shown in Fig. 6 (D1-Simulated and D2-real net- ments was better than 83.59% reaching its
work). The results show that in the worst case, maximum (87.69%) when 8 hidden neurons were
when the RBF-NN is trained using the first sce- used. The experimental results were almost as
nario data, the correct identification was better good as with the TCP protocol but with a slight
than 98%. If the RBF-NN is trained using the sec- smaller efficiency.
ond scenario data the correct identification rate
was 100% in all timeframes and overlapping steps.
9. Conclusions

8. DDoS detection on the UDP protocol The DDoS attacks are becoming one of the
InternetÕs most critical problems. With the Inter-
While all our experiments so far, are concerned netÕs speeds increasing, the need for lighter and
with the TCP/IP protocol, the same recognition more efficient detection systems is necessary. It is
mechanism should also detect DDoS attacks in shown that the proposed method can successfully
the UDP protocol. To evaluate the DDoS detector identify known DDoS attacks with very high
preliminary experiments were carried out using the detection rates. It can be easily implemented and
RBF-NN and only two features: the Source-port integrated into any network because it is a passive
and the Time-to-Live which are both used in the monitoring system requiring very few computing
UDP protocol. A 3 up to 20 hidden neuron resources since it uses statistical features.
RBF-NN was trained using 186 examples, and Today, the most widely method used for pre-
the detector was evaluated using a different set of venting Denial of Service attacks is to block all
244 D. Gavrilis, E. Dermatas / Computer Networks 48 (2005) 235–245

Fig. 6. Correct classification rate versus the number of weights for the best timeframe configuration, the simulated (D1) and the real
(D2) network.

packets that donÕt belong to an established con- we assume known DDoS attacks. Each of those
nection when a DDoS attack has been recog- tools has a specific signature that allows it to be
nized. This procedure takes place within a time detected. However, someone could write a new
frame where the DDoS detector monitors the tool that follows a different pattern. In such a case,
network by allowing all packets to pass. If a if a DDoS detector isolates the DDoS packets, the
DDoS is detected, all packets that donÕt belong development of automatic blocking methods for
to an established connection are blocked. Thus, the DDoS packets can be used to eliminate the
the proposed method can be easily integrated influence of the DDoS attacks especially in large
with existing technologies to prevent such networks.
attacks.
A most challenging task is to effectively block a
DDoS attack without interfering with normal traf- References
fic. The task of selectively blocking packets that
are presumed to belong to an attack session is ex- [1] P. Mell, D. Marks, M. McLarnon, A denial-of-service,
Computer Networks 34 (2000) 641–658.
tremely difficult and has never been attempted. [2] T. Ptacek, T. Newsham, Insertion, Evasion, and Denial-of-
Also the use of more advanced DDoS tools than Service: Eluding Network Intrusion Detection, Secure
those that exist today, must be considered. Networks Inc., 1998.
Another method of preventing an attack is to [3] J. Ryan, M. Lin, R. Miikkulainen, Intrusion detection
with neural networksAdvances in Neural Information
search for patterns in the network packets when
Processing Systems, vol. 10, MIT Press, Cambridge, MA,
a DDoS attack has been recognized and then to 1998.
block the packets that follow a specific statistical [4] R. Barder, The evolution of intrusion detection systems—
pattern. This can be successfully implemented if the next step, Computer & Security 20 (1) (2001) 132–145.
D. Gavrilis, E. Dermatas / Computer Networks 48 (2005) 235–245 245

[5] R. Graham, NIDS-pattern search vs. protocol decode, [19] J. Belissent, Method and apparatus for preventing a denial
Computer & Security 20 (1) (2001) 37–41. of service (DOS) attack by selectively throttling TCP/IP
[6] L. Me, GASSATA, A genetic algorithm as an alternative requests, Patent WO0201834, Sun Microsystems Inc. (US),
tool for security audit trails analysis, First International 2002.
Workshop on the Recent Advances in Intrusion Detection, [20] A. Bivens, C. Palagiri, R. Smith, B. Szymanski, M.
Belgium, 1998. Embrechts, Network-based intrusion detection using neu-
[7] J. Bonifacio, A. Casian, CPLF de A. Carvalho, E. Moreira, ral networks (2002), Artificial Neural Networks In Engi-
Neural networks applied in intrusion detection systems, in: neering November 10–13, St. Louis, Missouri, 2002.
Proceedings of the Word Congress on Computational [21] W. Streilein, R.K. Cunningham, S.E. Webster, Improved
Intelligence—WCCI, Anchorage, USA, 1998, pp. 205–210. detection of low-profile probe and novel denial-of-service
[8] Y. Liao, R. Vemuri, Use of K-nearest neighbor classifier attacks (2002), Workshop on Statistical and Machine
for intrusion detection, Computer & Security 21 (5) (2001) Learning Techniques in Computer Intrusion Detection,
439–448. Baltimore, Maryland, June 2002, pp. 11–13.
[9] M. Baltatu, A. Lioy, F. Maino, D. Mazzocchi, Security [22] H. Debar, M. Baker, D. Siboni, A neural network
issues in control, management and routing protocols, component for an intrusion detection system, in: Proceed-
Computer Networks 34 (2000) 881–894. ings of the IEEE Computer Society Symposium on
[10] Y.W. Chen, Study on the prevention of SYN flooding Research in Security and Privacy, 1992.
by using traffic policing, IEEE Symposium on Network [23] C. Douligeris, A. Mitrokotsa, DDoS attacks and defense
Operations and Management, 2000, pp. 593–604. mechanisms: classification and state-of-the-art, Computer
[11] C. Schuba, I. Krsul, M. Kuhn, E. Spafford, A. Sundaram, Networks 44 (5) (2004) 643–666.
D. Zamboni, Analysis of a denial-of-service attack on [24] S. Haykin, Neural Networks: A Comprehensive Founda-
TCP, in: Proceedings of the IEEE Computer Society tion, Predice Hall, Upper Saddle River, NJ, 1994.
Symposium on Research in Security and Privacy, USA,
1997, pp. 208–223.
[12] R. Lippmann, R. Cunnigham, Improving intrusion detec- Dimitris Gavrilis received the Diploma
tion performance using Keyword selection and neural in Electrical Engineering from the
University of Patras in 2002. He is
networks, Computer Networks 34 (2000) 596–603. currently a Ph.D. candidate in the
[13] W. Scwartau, Surviving denial-of-service, Computers & Department of Electrical and Com-
Security 18 (2) (1999) 124–133. puter Engineering of the University of
[14] F. Lau, S. Rubin, M. Smith, L. Trajkovic, Distributed Patras. His research interest areas
include computer security, intrusion
denial-of-service attacks, in: Proceedings of the IEEE detection, pattern recognition and
International Conference on Systems, Man and Cybernet- information extraction.
ics, vol. 3, 2000, pp. 2275–2280.
[15] J. Cabrera, B. Ravichandran, R. Mehra, Statistical traffic
modeling for network intrusion detection, IEEE Interna-
tional Workshop on Modeling, Analysis, and Simulation
of Computer and Telecommunication Systems, 2000, pp.
466–473.
Evangelos Dermatas is Assistant Pro-
[16] D. Cox, K. McClanahan, Method for blocking denial of fessor at the Department of Electrical
service and address spoofing attacks on a private network, and Computer Engineering of the
Patent WO9948303, Cisco Tech Ind (US), 1999. University of Patras, Patras, Hellas.
[17] K. Narayanaswamy, T. Ross, B. Spinney, M. Paquette, C. He received his Diploma and Ph.D.
degrees from the Department of Elec-
Wright, System and process for defending against denial of trical Engineering of the University of
service attacks on network nodes, Patent WO0219661, Top Patras, Patras, Hellas in 1985 and 1991
Layer Networks Inc. (US), 2002. respectively. His research interest areas
[18] R. Maher, V. Bennett, Method for preventing denial of include: statistical signal processing,
pattern recognition, computer security
service attacks, Patent WO0203084, Netrake Corp (US), and information extraction.
2002.

Вам также может понравиться