Dos 11
Dos 11
Attack
Yudha Purwanto, Kuspriyanto, Hendrawan, Budi Rahardjo
Bandung Insitute of Technology
Bandung, Indonesia
[email protected], [email protected], [email protected], [email protected]
Abstract—Researches have been conducted to overcome However, all survey mentioned above haven’t discussed the
Distributed Denial of Service (DDoS) flooding attack. Beside the spesific research problem in each anomaly detection system.
use of signature based detection, anomaly based detection is also Specific problem will be resolved in specific methods and
used to detect the attack. Several methods such as statistic, process, and lead to system capability focus.
information theory, data mining and forecasting have been
proposed. In several researches, they just focused to detect the This paper contribution are as follow :
traffic anomaly, but not to recognize the types of anomaly that
• Categorize methods based on sistem capability, which are
were detected such as flashcrowd, types of botnet, types of DDoS,
and prevention action. In this paper we categorize anomaly
anomaly detection, type of anomaly detection, differentiate
traffic detection system based on process and capability focus. flashcrowd and DDoS, and prevention action to overcome
Anomaly detection system process including traffic features, the attack.
preprocessing, and detection process. Capability focus based on • Provide overview of research direction due regard to
each main research problem to be solved, there are detectingonly anomaly traffic detection capability focus.
anomaly, types of anomaly, and prevention system that include
process to overcome the attack. At the end of paper, we provide II. OVERVIEW
overview of research direction and opportunities that may be
done in future research. In an attempt to protect the host and service from DoS and
DDoS attacks there are two methods in the IDS / IPS, namely
Keywords—DDoS, anomaly detection, flashcrowd, intrusion signature-based and anomaly-based traffic. Intrusion
botnet, prevention signature-based is done by matching the packet signature with
existing attack signatures in a database (known signature
I. INTRODUCTION attack). This detection technique has the advantage of low
Quality of Service (QoS) is an important factor in false positive for constantly updated database, but has
computer network. Several QoS architecture developed in weakness that can’t detect attacks that haven’t exist in the
networking scope to guarentee QoS requirement. Capability database (unknown attack).This weakness lead to very
that couldn’t be successfully acomplished in QoS architecture vulnerable system to new type of attack or modified attack.
is to deal with flooding traffic. Flood traffic could be happend Flashcrowd is an increasing traffic phenomena as the
as flooding attack DDoS phenomena or normal flashcrowd. number of users who access the server increase significantly
Flashcrowd is legal flooding traffic that tried to rearch the during any spesific event. The natural increasing number of
service as it came from the increasing legitimate users with users occurs gradually, not so instantaneous/drastic as the
normal rate. But DDoS is ilegal flooding trafficthat tried to hit information dissemination of any event.From the QoS
the server down by sending high packet rate traffic (or might perspective, flashcrowd should still be served by the server to
be combined with huge packet size) so legitimate user maintain a good QoS level. The number of packets that
couldn’t access the service. This is because the traverse through the network links and nodes should still be
telecommunication resources that were used to serve the user maintained, and the availability of the server must remain high
traffic is not unlimited. even though the number of packets is very large.
This paper review many researches on traffic anomaly As the opposite, DDoS flooding attack was done to disrupt
detection, esspecially flooding attack, and categorize them the QoS both in network links and nodes. Attack targets is
based capability focus. Almost all anomaly detection survey either link (bandwidth) and node computing resources
paper classify reasearch based on methods as listed in table (processes, memory, and buffer) to make the system crashes
I.[1]categorize system based on fundamental approach of therefore can’t serve any user request. DDoS flooding attacks
detection methods, which explain almost all technical aspects can be either one or a combination of exploited protocol
that influence the detection system in several application area. (communication sequence), many connections, connection with
A modest survey in [2]categorize system in three technical huge message size, address spoofing, reflection and
domain which are statistical mehtod, streaming algorithm, and amplification from open service server.In [4]describe
unsupervised machine learning. A comprehensive survey in flashcrowd as a situation when hundreds of thousands users try
[3]categorize research based on methods/techniques, tools, and to access computing resources in the same time, while DDoS
broad view of in many applications. The paper review almost almost few thousand in [5].
all detection methods in past anomaly detection research.
TABLE I. COMPARISON BETWEEN THE REFERENCE SURVEY PAPER