Simulation for L3 Volumetric Attack Detection

01/26/2018
by   Oliver Rutishauser, et al.
0

The detection of a volumetric attack involves collecting statistics on the network traffic, and identifying suspicious activities. We assume that available statistical information includes the number of packets and the number of bytes passed per flow. We apply methods of machine learning to detect malicious traffic. A prototype project is implemented as a module for the Floodlight controller. The prototype was tested on the Mininet simulation platform. The simulated topology includes a number of edge switches, a connected graph of core switches, and a number of server and user hosts. The server hosts run simple web servers. The user hosts simulate web clients. The controller employs Dijkstra's algorithm to find the best flow in the graph. The controller periodically polls the edge switches and provides current and historical statistics on each active flow. The streaming analytics evaluates the traffic volume and detects volumetric attacks.

READ FULL TEXT

page 3

page 4

page 5

page 6

page 7

research
06/19/2023

Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy

IoT Servers that receive and process packets from IoT devices should mee...
research
09/28/2020

Traffic model of LTE using maximum flow algorithm with binary search technique

Inrecent time a rapid increase in the number of smart devices and user a...
research
06/01/2022

LDoS attack detection method based on traffic time-frequency characteristics

For the traditional denial-of-service attack detection methods have comp...
research
02/03/2023

Machine Learning-based Early Attack Detection Using Open RAN Intelligent Controller

We design and demonstrate a method for early detection of Denial-of-Serv...
research
05/15/2018

Seek and Push: Detecting Large Traffic Aggregates in the Dataplane

High level goals such as bandwidth provisioning, accounting and network ...
research
11/09/2021

Classifying DNS Servers based on Response Message Matrix using Machine Learning

Improperly configured domain name system (DNS) servers are sometimes use...

Please sign up or login with your details

Forgot password? Click here to reset