Predicting Number of Zombies in DDoS Attacks Using Pace Regression Model

Gupta, B. B.
March 2012
Journal of Computing & Information Technology;Mar2012, Vol. 20 Issue 1, p33
Academic Journal
A DDoS attacker attempts to disrupt a target, by flooding it with illegitimate packets which are generated from a large number of zombies, usurping its bandwidth and overtaxing it to prevent legitimate inquiries from getting through. This paper reports the evaluation results of proposed approach that is used to predict number of zombies using Pace Regression Model. A relationship is established between number of zombies and observed deviation in sample entropy. Various statistical performance measures, such as R² CC, SSE, MSE, RMSE NMSE, η, MAE are used to measure the performance of the regression model. Network topologies similar to Internet used for simulation are generated using Transit-Stub model of GT-ITM topology generator. NS-2 network simulator on Linux platform is used as simulation test bed for launching DDoS attacks with varied number of zombies. The simulation results are promising as we are able to predict number of zombies efficiently using Pace Regression Model with considerably less error rate.


Related Articles

  • Adaptive Packet Context-Constrained KL-Divergence Model for Intrusion Detection. Hongxia Shi // Journal of Networks;Aug2014, Vol. 9 Issue 8, p2045 

    Recently, intrusion detection research has make some important achievements. A variety of classical machine learning and entropy analyze algorithms has been applied to intrusion detection with varying levels of success. In this paper, we analyze the traffic connection statistics information, and...

  • Low-rate DDOS Attack Detection using Optimal Objective Entropy Method. Jadhav, Poonam N.; Patil, B. M. // International Journal of Computer Applications;Sep2013, Vol. 78, p33 

    A Distributed Denial of Service (DDOS) attack is a type of Internet attack that disrupts the normal function of the targeted computer network (server). This kind of attacks attempts to make target host resource unavailable to its legal users. Several efforts had made in detection and computation...

  • A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging. Dong Yan; Yulong Wang; Sen Su; Fangchun Yang // Journal of Information Science & Engineering;May2012, Vol. 28 Issue 3, p453 

    Tracing malicious packets back to their source is important to defend the Internet against Denial of Service (DOS) intrusion. IP traceback is just the technique to realize the goal, it reconstructs IP packets traversed path in the Internet to determine their origins. There are two major kinds of...

  • MITIGATING DoS/DDoS ATTACKS USING IPTABLES. AL-Musawi, Bahaa Qasim M. // International Journal of Engineering & Technology;Jun2012, Vol. 12 Issue 3, p101 

    Denial-of-Service (DoS) is a network security problem that constitutes a serious challenge to reliability of services deployed on the servers. The aim of DoS attacks is to exhaust a resource in the target system, reducing or completely subverting the availability of the service provided. Threat...

  • Packet Hiding Scheme without Packet Loss (PHSPL) for defensive against Jamming Attack. Patil, Archana; Pingat, S. P. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 5, p6606 

    Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks, referred to as jamming. Wireless sensor networks are based on shared medium which makes easy for opponent to conduct radio interference, or jamming, attacks that effectively cause a denial of service on...

  • A New Attack Detection in Large Scale Network based on Entropy. Qin Qia; Zhiwen Wang // Journal of Networks;May2012, Vol. 7 Issue 5, p863 

    Intrusion Detection System (IDS) typically generates a huge number of alerts with high false rate, especially in the large scale network, which result in a huge challenge on the efficiency and accuracy of the network attack detection. In this paper, an entropy-based method is proposed to analyze...

  • DISTRIBUTED DETECTION OF DDOS ATTACKS DURING THE INTERMEDIATE PHASE THROUGH MOBILE AGENTS. Akyazi, Ugur; Uyar, A. Sima; Brézillon, Patrick // Computing & Informatics;2012, Vol. 31 Issue 4, p759 

    A Distributed Denial of Service attack is a large-scale, coordinated attack on the availability of services of a victim system, launched indirectly through many compromised computers on the Internet. Intrusion detection systems are network security tools that process local audit data or monitor...

  • Implementation of a Secured system with Roaming Server and Roaming Ports. Bharathi, R.; Sukanesh, R. // International Journal on Computer Science & Engineering;2011, Vol. 3 Issue 5, p1781 

    The main goal of this paper is to design and implement a secured system against Server hijacking, which leads to Denial of Service (DoS) [5] attacks. This system uses more than one server for providing security. But only one server will be active at a time. The inactive servers act as Roaming...

  • A NOVEL HEADER MATCHING ALGORITHM FOR INTRUSION DETECTION SYSTEMS. Alia, Mohammad A.; Hnaif, Adnan A.; Al-Anie, Hayam K.; Abu Maria, Khulood; Manasrah, Ahmed M.; Sarwar, M. Imran // International Journal of Network Security & Its Applications;Jul2011, Vol. 3 Issue 4, p59 

    The evolving necessity of the Internet increases the demand on the bandwidth. Therefore, this demand opens the doors for the hackers' community to develop new methods and techniques to gain control over networking systems. Hence, the intrusion detection systems (IDS) are insufficient to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics