6
6
Page 44
SYN Flood
It occurs when a host sends a flood of TCP/SYN packets, often with a forged
sender address. Each of these packets is handled like a connection request, causing the
server to spawn a half open connection, by sending back a TCP/SYN-AUL packet, and
waiting for a packet in response from the sender address. Moreover, because the sender
address is forged, the response never comes. These half open connections saturate the
number of available connections the server is able to make, keeping it from responding to
legitimate requests until the after the attack ends.
R S. Publication (rspublication.com), rspublicationhouse@gmail.com
Page 45
Ping of Death
It is based on sending the victim a malformed ping packet, which might lead to a
system crash. On the Internet, ping of death is a denial of service (Dos) attack caused by
an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the
IP protocol. One of the features of TCP/IP is fragmentation; it allows a single IP packet to
be broken down into smaller segments. In 1996, attackers began to take advantage of that
feature when they found that a packet broken down into fragments could add up to more
than the allowed 65,536 bytes. Many operating systems didn't know what to do when they
received an oversized packet, so they froze, crashed, or rebooted.
Ping of death attacks were particularly nasty because the identity of the attacker
sending the oversized packet could be easily spoofed and because the attacker didn't need
to know anything about the machine they were attacking except for its IP address. By the
end of 1997, operating system vendors had made patches available to avoid the ping of
death. Still, many Web sites continue to block Internet Control Message Protocol (ICMP)
ping messages at their firewalls to prevent any future variations of this kind of denial of
service attack.
Smurf Attack
One particular variant of a flooding DoS attack on the public internet. It relies on
misconfigured network devices that allow packets on a particular network via the
broadcast address of the network, rather than a specific machine.
1.1.2 APPLICATION LAYER DDoS ATTACKS
The various application layer attacks are Session flooding attack, Request flooding
attack Asymmetric attack.
Page 46
generated by legitimate users. Unlike the Net-DDoS attacks, App-DDoS attacks do not
necessarily rely on inadequacies in the underlying protocols or operating systems; they can be
mounted with legitimate requests from legitimately connected network machines. Usually,
AppDDoS attacks utilize the weakness enabled by the standard practice of opening services
such as HTTP and HTTPS (TCP port 80and 443) through most firewalls to launch the attack.
Many protocols and applications, both legitimate and illegitimate, can use these
openings to tunnel through firewalls by connecting over a standard TCP port 80 (e.g., Code
Red virus) or encapsulating in SSL tunnels (HTTPS).Attack requests aimed at these services
may pass through the firewall without being denied. Furthermore; attackers may request
services to the point where other clients are unable to complete their transactions or are
inconvenienced to the point where they give up trying.
Asymmetric attack
This attack sends sessions with more high-workload requests. Each attack session
sends a higher proportion of requests, each of which has a higher value of Workload.
Asymmetric attacks that send high-workload request types in sessions. Attackers may use one
or any combination of them. Asymmetric attack sends sessions with higher workload
requests.
An asymmetric attack overwhelms the server resources, by increasing the response
time of legitimate clients from 0.1 seconds to10 Seconds. Under the same attack scenario,
HMM model limits the effects of false negative sand false-positives and improves the
Victims performance to 0.8 seconds.
2. DATA MINING
Data mining is, at its core, pattern finding. Data miners are proficient at using specialized
software to find regularity in large & complex data sets. Data mining applications are
computer software programs or packages that enable the extraction and identification of
patterns from stored data. A data mining application is typically a software interface which
interacts with a large database containing Network traffic parameters or other important data.
Data mining is widely used by companies and public bodies for marketing, detection of
fraudulent activities such as DDoS attacks.
2.1 VARIOUS APPLICATION AREAS OF DATA MINING IN DDOSATTACK
Recently, data mining has become an important component for DDoS attack
prevention. Different data mining approaches like classification, association rule,
clustering, and outlier detection are the few techniques frequently used to analyze
network traffic or data to gain knowledge that helps in controlling intrusion. Various
applications where data mining approach can be used in prevention and detection of DDoS
attacks are discuss below:
2.1.1 INTRUSION DETECTION
Intrusion detection is the process of observing the events occurring in a computer
system or network and analyzing them for instances which violates related security policies
or practices. Intrusion detection techniques can be classified as misuse detection and
R S. Publication (rspublication.com), rspublicationhouse@gmail.com
Page 47
anomaly detection. Misuse detection systems, e.g., IDIOT and STAT , use patterns of
well-known attacks or weak spots of the system to match and identify known
intrusions.
Anomaly detection systems, e.g., IDES flag observed activities that deviate significantly
from the established normal usage profiles as anomalies, i.e., possible intrusions. Today the
main reason of using Data Mining for intrusion detection systems is the enormous volume of
existing and newly appearing network data that requires processing. Literature also provides
evidence where data mining techniques are used for intrusion detection.
2.1.2 IP TRACEBACK
DDoS is rapidly growing problem. IP Traceback is the ability to trace IP packets from source
to destination. This is a significant step towards identifying and thus stopping
attackers. The IP Traceback is an important mechanism in defending against DDoS attacks.
Lot of techniques and methodologies are used to trace the DDoS attacks.
3. PROPOSED DATA MINING ALGORITHMS
As the enhanced approach, we propose the data mining algorithms such as decision tree
algorithm and Neural network algorithm. It uses the automatic feature selection mechanism
and builds the classifier by the neural network technology with the automatic selected
attributes. For the selection of the important attributes, heuristic method cant prove that the
choice is the best, and the many trials and the many processing time are required. So, we
propose the decision tree algorithm, one of the data mining technologies, as the automatic
feature selection mechanism. It can output the best attributes set for the candidate attributes
and their priority, using the entropy or the chi-square theory. This algorithm theoretically
provides insight into the patterns that may be exhibited in the data. Such mapping approach
between decision tree and neural network was proposed for the goal to accurately specify the
number of units, layers, connection and initial setting of parameters of neural network.
Netflow Data
in the Normal
attack
Decision Tree
Algorithm
Detection of
DDoS Attack
Neural Network
Figure 2: Architecture forAlgorithm
detection of DDoS attack
4. CONCLUSIONS
In this paper, we have proposed a data mining algorithm for the DDoS attack detection of the
various types that is composed of the automatic feature selection module by decision tree
algorithm. These two algorithms are mounted which the most powerful DDoS attack is
R S. Publication (rspublication.com), rspublicationhouse@gmail.com
Page 48
changing attack types, so we could get the attack traffic of various types. The future works
include the comparative experiments using various data mining technologies, and
comparative experiments between the data mining approach and the pure statistic approach.
REFERENCES
[1] Mihui Kim, et al.: A Combined Data Mining Approach for DDoS Attack Detection.Proc.
of ICOI(2004)
[2] Wenke Lee, Salvatore J. Stolfo: Data Mining Approaches for Intrusion Detection.Proc.
of the 7th USENIX Security Symposium (1998)
[3] Hyunjung Na, et al.: Distributed Denial of Service Attack Detection using Netflow
Traffic. Proc. of the Korea Information Processing Society (2003)
[4] LI Aijun, LIU Yunhui and LUO Siwei: Mapping a Decision Tree for Classification into
A Neural Network. Proc. of the 6th International Conference on Computational
Intelligence & Natural Computing.
Page 49