SlideShare a Scribd company logo
A Rank Correlation Based Detection against Distributed
Reflection DoS Attacks
ABSTRACT:
DDoS presents a serious threat to the Internet since its inception, where lots of
controlled hosts flood the victim site with massive packets. Moreover, in
Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors)
into flushing packets to the victim. But most of current DRDoS detection
mechanisms are associated with specific protocols and cannot be used for unknown
protocols. It is found that because of being stimulated by the same attacking flow,
the responsive flows from reflectors have inherent relations: the packet rate of one
converged responsive flow may have linear relationships with another. Based on
this observation, the Rank Correlation based Detection (RCD) algorithm is
proposed. The preliminary simulations indicate that RCD can differentiate
reflection flows from legitimate ones efficiently and effectively, thus can be used
as a useable indicator for DRDoS.
EXISTING SYSTEM:
There have been some packet-level defense methods. Filtering all incoming
response packets, which is of low cost, will result in no general access to the
remote server. Inspecting packet content and tracking protocol status maybe
helpful, but need a lot of computation which is also vulnerable to attacks. Along
with more protocols being exploited to launch DRDoS, countermeasures must
consider a list of possible protocols with each one treated specifically, and the list
needs to be updated in time. So we urgently expect some protocol independent
methods to help detecting most kinds of DRDoS.
PROPOSED SYSTEM:
We investigate the basic traffic pattern introduced near the victim under DRDoS,
and propose a general detection method: the Rank Correlation based Detection
(RCD). RCD is protocol independent and its computation cost is not affected by
network throughput. In RCD, once an attack alarm rises, upstream routers will
sample and test rank correlation of suspicious flows and use the correlation value
for further detection. Correlation has been successfully used in DDoS detection,
e.g., correlation coefficient has been successfully employed to discriminate DDoS
attacks from flash crowds. As we know, it is the first time that DRDoS is analyzed
and detected using correlation.
ADVANTAGES OF PROPOSED SYSTEM:
The preliminary simulations indicate that RCD can differentiate reflection flows
from legitimate ones efficiently and effectively, thus can be used as a useable
indicator for DRDoS.
ALGORITHM USED:
Spearman’s Rank Correlation
The well-known Pearson’s correlation coefficient is suitable for describing the
linear relationship. However, due to the background traffic and delay, the linearity
may not be obvious. And Pearson’s correlation is sensitive to outliers introduced
by traffic bursts. Through experimental comparisons, Spearman’s rank correlation
coefficient (Spearman’s rho) is more suitable for detection, where a raw value is
converted to a ranked value and then Pearson’s correlation is applied. For a given
value, its ranked value is the average of its position(s) in the ascending order of all
values.
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 512 MB(min)
 Hard Disk - 40 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - LCD/LED
SOFTWARE REQUIREMENTS:-
 Operating System : LINUX
 Tool : Network Simulator-2
 Front End : OTCL (Object Oriented Tool Command
Language)
REFERENCE:
Wei Wei, Feng Chen, Yingjie Xia, and Guang Jin, “A Rank Correlation Based
Detection against Distributed Reflection DoS Attacks”, IEEE
COMMUNICATIONS LETTERS, VOL. 17, NO. 1, JANUARY 2013

More Related Content

DOCX
A rank correlation based detection against distributed reflection do s attacks
PDF
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
DOCX
Privacy preserving and truthful detection
PDF
Limiting Self-Propagating Malware Based on Connection Failure Behavior
PDF
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
PDF
DoS Forensic Exemplar Comparison to a Known Sample
PPTX
Trust Based Routing In wireless sensor Network
PPTX
Delaunay based two-phase algorithm for connected cover in WSNs
A rank correlation based detection against distributed reflection do s attacks
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
Privacy preserving and truthful detection
Limiting Self-Propagating Malware Based on Connection Failure Behavior
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
DoS Forensic Exemplar Comparison to a Known Sample
Trust Based Routing In wireless sensor Network
Delaunay based two-phase algorithm for connected cover in WSNs

What's hot (13)

PDF
Anomalous payload based network intrusion detection
PDF
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
PDF
An os independent heuristics based worm-containment system
PDF
An4101227230
PDF
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
PDF
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DOC
Layered approach using conditional random fields for intrusion detection (syn...
PDF
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDF
A1803050106
PDF
Efficient ddos attacks security scheme using asvs
PDF
Efficient ddos attacks security scheme using asvs
PDF
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
DOCX
Spatial approximate string search
Anomalous payload based network intrusion detection
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
An os independent heuristics based worm-containment system
An4101227230
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
Layered approach using conditional random fields for intrusion detection (syn...
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
A1803050106
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
Spatial approximate string search
Ad

Viewers also liked (19)

DOCX
Network assisted mobile computing with optimal uplink query processing
DOCX
Using fuzzy logic control to provide intelligent traffic management service f...
PDF
Facilitating document annotation using content and querying value
DOCX
Towards secure multi keyword top-k retrieval over encrypted cloud data
PDF
final year ieee projects in pondicherry
PDF
2013 ieee java project titles for cse, it and mca
DOCX
Back pressure-based packet-by-packet adaptive routing in communication networks
DOC
IEEE PROJECTS FOR ECE 2013 2014
DOCX
Participatory privacy enabling privacy in participatory sensing
DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
PDF
2013 14 ieee ece project titles - jp infotech
DOCX
Privacy preserving delegated access control in public clouds
DOCX
Distributed cooperative caching in social wireless networks
PDF
Twitsper tweeting privately
DOCX
Identity based secure distributed data storage schemes
DOCX
Efficient algorithms for neighbor discovery in wireless networks
DOCX
Toward fine grained, unsupervised, scalable performance diagnosis for product...
DOCX
Proteus multiflow diversity routing for wireless networks with cooperative tr...
DOCX
Secure mining of association rules in horizontally distributed databases
Network assisted mobile computing with optimal uplink query processing
Using fuzzy logic control to provide intelligent traffic management service f...
Facilitating document annotation using content and querying value
Towards secure multi keyword top-k retrieval over encrypted cloud data
final year ieee projects in pondicherry
2013 ieee java project titles for cse, it and mca
Back pressure-based packet-by-packet adaptive routing in communication networks
IEEE PROJECTS FOR ECE 2013 2014
Participatory privacy enabling privacy in participatory sensing
A highly scalable key pre distribution scheme for wireless sensor networks
2013 14 ieee ece project titles - jp infotech
Privacy preserving delegated access control in public clouds
Distributed cooperative caching in social wireless networks
Twitsper tweeting privately
Identity based secure distributed data storage schemes
Efficient algorithms for neighbor discovery in wireless networks
Toward fine grained, unsupervised, scalable performance diagnosis for product...
Proteus multiflow diversity routing for wireless networks with cooperative tr...
Secure mining of association rules in horizontally distributed databases
Ad

Similar to A rank correlation based detection against distributed reflection do s attacks (20)

DOCX
Detection and localization of multiple spoofing attackers in wireless networks
PPTX
Behavioral malware detection in delay tolerant network
PDF
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
PDF
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
PDF
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
PDF
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
PDF
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
DOCX
Defending against collaborative attacks by
PDF
Aa04404164169
DOC
Detection of application layer ddos attack using hidden semi markov model (20...
DOCX
Entropy based DDos Detection in SDN
PDF
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
PDF
SUBSIDING ROUTING MISBEHAVIOR IN MANET USING “MIRROR MODEL
PDF
Attack tor
PDF
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
PDF
HYBRID DEEP LEARNING APPROACH FOR ENHANCED DETECTION AND MITIGATION OF DDOS A...
PDF
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
DOCX
Secure data aggregation technique for wireless sensor networks in the presenc...
PDF
Wormhole attack detection algorithms in wireless network coding systems
PDF
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud
Detection and localization of multiple spoofing attackers in wireless networks
Behavioral malware detection in delay tolerant network
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
Defending against collaborative attacks by
Aa04404164169
Detection of application layer ddos attack using hidden semi markov model (20...
Entropy based DDos Detection in SDN
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
SUBSIDING ROUTING MISBEHAVIOR IN MANET USING “MIRROR MODEL
Attack tor
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
HYBRID DEEP LEARNING APPROACH FOR ENHANCED DETECTION AND MITIGATION OF DDOS A...
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
Secure data aggregation technique for wireless sensor networks in the presenc...
Wormhole attack detection algorithms in wireless network coding systems
DFAA- A Dynamic Flow Aggregation Approach Against SDDOS Attacks in Cloud

Recently uploaded (20)

PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
master seminar digital applications in india
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Institutional Correction lecture only . . .
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Cell Types and Its function , kingdom of life
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
master seminar digital applications in india
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
2.FourierTransform-ShortQuestionswithAnswers.pdf
Anesthesia in Laparoscopic Surgery in India
TR - Agricultural Crops Production NC III.pdf
PPH.pptx obstetrics and gynecology in nursing
Supply Chain Operations Speaking Notes -ICLT Program
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Final Presentation General Medicine 03-08-2024.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Institutional Correction lecture only . . .
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Cell Types and Its function , kingdom of life
Insiders guide to clinical Medicine.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx

A rank correlation based detection against distributed reflection do s attacks

  • 1. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks ABSTRACT: DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood the victim site with massive packets. Moreover, in Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors) into flushing packets to the victim. But most of current DRDoS detection mechanisms are associated with specific protocols and cannot be used for unknown protocols. It is found that because of being stimulated by the same attacking flow, the responsive flows from reflectors have inherent relations: the packet rate of one converged responsive flow may have linear relationships with another. Based on this observation, the Rank Correlation based Detection (RCD) algorithm is proposed. The preliminary simulations indicate that RCD can differentiate reflection flows from legitimate ones efficiently and effectively, thus can be used as a useable indicator for DRDoS. EXISTING SYSTEM: There have been some packet-level defense methods. Filtering all incoming response packets, which is of low cost, will result in no general access to the
  • 2. remote server. Inspecting packet content and tracking protocol status maybe helpful, but need a lot of computation which is also vulnerable to attacks. Along with more protocols being exploited to launch DRDoS, countermeasures must consider a list of possible protocols with each one treated specifically, and the list needs to be updated in time. So we urgently expect some protocol independent methods to help detecting most kinds of DRDoS. PROPOSED SYSTEM: We investigate the basic traffic pattern introduced near the victim under DRDoS, and propose a general detection method: the Rank Correlation based Detection (RCD). RCD is protocol independent and its computation cost is not affected by network throughput. In RCD, once an attack alarm rises, upstream routers will sample and test rank correlation of suspicious flows and use the correlation value for further detection. Correlation has been successfully used in DDoS detection, e.g., correlation coefficient has been successfully employed to discriminate DDoS attacks from flash crowds. As we know, it is the first time that DRDoS is analyzed and detected using correlation. ADVANTAGES OF PROPOSED SYSTEM: The preliminary simulations indicate that RCD can differentiate reflection flows from legitimate ones efficiently and effectively, thus can be used as a useable indicator for DRDoS.
  • 3. ALGORITHM USED: Spearman’s Rank Correlation The well-known Pearson’s correlation coefficient is suitable for describing the linear relationship. However, due to the background traffic and delay, the linearity may not be obvious. And Pearson’s correlation is sensitive to outliers introduced by traffic bursts. Through experimental comparisons, Spearman’s rank correlation coefficient (Spearman’s rho) is more suitable for detection, where a raw value is converted to a ranked value and then Pearson’s correlation is applied. For a given value, its ranked value is the average of its position(s) in the ascending order of all values. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-  Processor - Pentium –IV  Speed - 1.1 Ghz
  • 4.  RAM - 512 MB(min)  Hard Disk - 40 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - LCD/LED SOFTWARE REQUIREMENTS:-  Operating System : LINUX  Tool : Network Simulator-2  Front End : OTCL (Object Oriented Tool Command Language) REFERENCE: Wei Wei, Feng Chen, Yingjie Xia, and Guang Jin, “A Rank Correlation Based Detection against Distributed Reflection DoS Attacks”, IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 1, JANUARY 2013