Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2008, Article ID 475878, 11 pages
http://dx.doi.org/10.1155/2008/475878
Research Article

Detection of Variations of Local Irregularity of Traffic under DDOS Flood Attack

1School of Information Science and Technology, East China Normal University, No. 500, Dong-Chuan Road, Shanghai 200241, China
2Rensselaer Polytechnic Institute, 110 8th Street, Troy, NY 12180-3590, USA

Received 24 March 2008; Accepted 1 April 2008

Academic Editor: Cristian Toma

Copyright © 2008 Ming Li and Wei Zhao. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. G. Coulouris, J. Dollimore, and T. Kindberg, Distributed Systems: Concepts and Design, Addison-Wesley, Reading, Mass, USA, 3rd edition, 2001.
  2. E. G. Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response, Intrusion.Net Book, Sparta, NJ, USA, 1999.
  3. L. Garber, “Denial-of-service attacks rip the Internet,” Computer, vol. 33, no. 4, pp. 12–17, 2000. View at Publisher · View at Google Scholar
  4. G. Toma, “Practical test functions generated by computer algorithms,” in Proceedings of the International Conference on Computational Science and Its Applications (ICCSA '05), vol. 3482 of Lecture Notes in Computer Science, pp. 576–584, Singapore, May 2005. View at Publisher · View at Google Scholar
  5. W. Willinger and V. Paxson, “Where mathematics meets the Internet,” Notices of the American Mathematical Society, vol. 45, no. 8, pp. 961–970, 1998. View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  6. M. Li, W. Zhao, W. Jia, D. Long, and C.-H. Chi, “Modeling autocorrelation functions of self-similar teletraffic in communication networks based on optimal approximation in Hilbert space,” Applied Mathematical Modelling, vol. 27, no. 3, pp. 155–168, 2003. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  7. B. Tsybakov and N. D. Georganas, “Self-similar processes in communications networks,” IEEE Transactions on Information Theory, vol. 44, no. 5, pp. 1713–1725, 1998. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  8. A. Adas, “Traffic models in broadband networks,” IEEE Communications Magazine, vol. 35, no. 7, pp. 82–89, 1997. View at Publisher · View at Google Scholar
  9. B. B. Mandelbrot, Gaussian Self-Affinity and Fractals, Springer, New York, NY, USA, 2002. View at Zentralblatt MATH · View at MathSciNet
  10. M. Li and S. C. Lim, “A rigorous derivation of power spectrum of fractional Gaussian noise,” Fluctuation and Noise Letters, vol. 6, no. 4, pp. C33–C36, 2006. View at Publisher · View at Google Scholar · View at MathSciNet
  11. J. Beran, Statistics for Long-Memory Processes, vol. 61 of Monographs on Statistics and Applied Probability, Chapman and Hall, New York, NY, USA, 1994. View at Zentralblatt MATH · View at MathSciNet
  12. M. Li, “Change trend of averaged Hurst parameter of traffic under DDOS flood attacks,” Computers & Security, vol. 25, no. 3, pp. 213–220, 2006. View at Publisher · View at Google Scholar
  13. M. Li and S. C. Lim, “Modeling network traffic using generalized Cauchy process,” Physica A, vol. 387, no. 11, pp. 2584–2594, 2008. View at Publisher · View at Google Scholar
  14. J. S. Bendat and A. G. Piersol, Random Data. Analysis and Measurement Procedures, John Wiley & Sons, New York, NY, USA, 3rd edition, 2000. View at Zentralblatt MATH
  15. M. Basseville, “Distance measures for signal processing and pattern recognition,” Signal Processing, vol. 18, no. 4, pp. 349–369, 1989. View at Publisher · View at Google Scholar · View at MathSciNet
  16. K. S. Fu, Ed., Digital Pattern Recognition, Springer, Berlin, Germany, 2nd edition, 1980. View at Zentralblatt MATH
  17. A. R. Webb, Statistical Pattern Recognition, Edward Arnold, London, UK, 1999. View at Zentralblatt MATH
  18. M. Li and W. Zhao, “A statistical model for detecting abnormality in static-priority scheduling networks with differentiated services,” in Proceedings of the International Conference on Computational Intelligence and Security (CIS '05), vol. 3802 of Lecture Notes in Computer Science, pp. 267–272, Springer, Xi'an, China, December 2005. View at Publisher · View at Google Scholar
  19. V. Paxson, “Bro: a system for detecting network intruders in real time,” in Proceedings of the 7th USENIX Security Symposium, San Antonio, Tex, USA, January 1998.
  20. W. Yu, D. Xuan, and W. Zhao, “Middleware-based approach for preventing distributed deny of service attacks,” in Proceedings of IEEE Military Communications Conference (MILCOM '02), vol. 2, pp. 1124–1129, Anaheim, Calif, USA, October 2002.
  21. P. Innella and O. McMillan, “An introduction to intrusion detection systems, tetrad digital integrity, LLC,” December 2001, http://www.securityfocus.com/infocus/1520/.
  22. http://en.wikipedia.org/wiki/Denial-of-service_attack/.
  23. http://www.sans.org/dosstep/index.php/.
  24. R. Bettati, W. Zhao, and D. Teodor, “Real-time intrusion detection and suppression in ATM net-works,” in Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, Calif, USA, April 1999.
  25. M. Li, “An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition,” Computers & Security, vol. 23, no. 7, pp. 549–558, 2004. View at Publisher · View at Google Scholar
  26. http://www.acm.org/sigcomm/ITA/.
  27. V. Paxson and S. Floyd, “Wide area traffic: the failure of Poisson modeling,” IEEE/ACM Transactions on Networking, vol. 3, no. 3, pp. 226–244, 1995. View at Publisher · View at Google Scholar