Artigo Revisado por pares

Detecting Distributed Denial-of-Service Attacks by Analyzing TCP SYN Packets Statistically

2006; Institute of Electronics, Information and Communication Engineers; Volume: E89-B; Issue: 10 Linguagem: Inglês

10.1093/ietcom/e89-b.10.2868

ISSN

1745-1345

Autores

Yuichi Ohsita, Shingo Ata, Masayuki Murata,

Tópico(s)

Network Traffic and Congestion Control

Resumo

Distributed denial-of-service attacks on public servers have recently become more serious. More are SYN Flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. To assure that network services will not be interrupted, we need faster and more accurate defense mechanisms against malicious traffic, especially SYN Floods. One of the problems in detecting SYN Flood traffic is that server nodes or firewalls cannot distinguish the SYN packets of normal TCP connections from those of SYN Flood attack. Moreover, since the rate of normal network traffic may vary, we cannot use an explicit threshold of SYN arrival rates to detect SYN Flood traffic. In this paper we introduce a mechanism for detecting SYN Flood traffic more accurately by taking into consideration the time variation of arrival traffic. We first investigate the statistics of the arrival rates of both normal TCP SYN packets and SYN Flood attack packets. We then describe our new detection mechanism based on the statistics of SYN arrival rates. Our analytical results show that the arrival rate of normal TCP SYN packets can be modeled by a normal distribution and that our proposed mechanism can detect SYN Flood traffic quickly and accurately regardless of time variance of the traffic.

Referência(s)