Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3230833.3230844acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
short-paper

A Reactive Defense Against Bandwidth Attacks Using Learning Automata

Published: 27 August 2018 Publication History

Abstract

This paper proposes a new adaptively distributed packet filtering mechanism to mitigate the DDoS attacks targeted at the victim's bandwidth. The mechanism employs IP traceback as a means of distinguishing attacks from legitimate traffic, and continuous action reinforcement learning automata, with an improved learning function, to compute effective filtering probabilities at filtering routers. The solution is evaluated through a number of experiments based on actual Internet data. The results show that the proposed solution achieves a high throughput of surviving legitimate traffic as a result of its high convergence speed, and can save the victim's bandwidth even in case of varying and intense attacks.

References

[1]
Zubair B. Adi, E. and Philip H. 2017. Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services. Journal of Network and Computer Applications 91 (2017), 1--13.
[2]
A. Askey and R. Roy. 2010. Beta function. Cambridge University Press.
[3]
CAIDA. 2004. CAIDA skitter map. (2004). http://www.caida.org/tools/measurement/skitter.
[4]
M. S. Fallah and N. Kahani. 2014. TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks. Security and Communication Networks 7, 2 (2014), 245--264.
[5]
V. A. Foroushani and A. N. Zincir-Heywood. 2014. TDFA: traceback-based defense against DDoS flooding attacks. In IEEE 28th International Conference on Advanced Information Networking and Applications (AINA). 597--604.
[6]
G. Frost. 1998. Stochastic optimization of vehicle suspension control systems via learning automata. Ph.D. Dissertation. Loughborough University.
[7]
Chen Z. Li J. Hongbin, L. and Vasilakos A.V. 2017. Preventing distributed denial-of-service flooding attacks with dynamic path identifiers. IEEE Transactions on Information Forensics and Security 12, 8 (2017), 1801--1815.
[8]
M. Howell, G. Frost, T. Gordon, and Q. Wu. 1997. Continuous action reinforcement learning applied to vehicle suspension control. Journal of Mechatronics 7, 3 (1997), 263--276.
[9]
N. Kahani, S. Shiry, and M. Bagherzadeh. 2008. Detecting denial of service attacks utilizing machine learning methods. In International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). IEEE.
[10]
Khan S. Shams B. Khan, M. A. and J. Lloret. 2015. Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks. Security and Communication Networks 9, 15 (2015), 2715--2729.
[11]
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxon, and S. Shenker. 2002. Controlling high bandwidth aggregates in the network. ACM SIGCOMM Computer Communication Review 32, 3 (2002), 62--73.
[12]
K.S. Narendra and M.A. Thathachar. 2012. Learning automata: an introduction. Courier Corporation (2012), 1--479.
[13]
S. Ping and L. Moonchuen. 2004. IP traceback marking scheme based packets filtering mechanism. In Workshop on IP Operations and Management. IEEE, 253--260.
[14]
M. Sung and J. Xu. 2003. IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks. IEEE Transactions on Parallel and Distributed Systems 14, 9 (2003), 861--872.
[15]
A. Yaar, A. Perrig, and D. Song. 2005. FIT: fast Internet traceback. In IEEE INFOCOM. 1395--1406.

Cited By

View all
  • (2021)An Introduction to Learning Automata and OptimizationAdvances in Learning Automata and Intelligent Optimization10.1007/978-3-030-76291-9_1(1-50)Online publication date: 24-Jun-2021
  • (2020)Varieties of Cellular Learning Automata: An OverviewCellular Learning Automata: Theory and Applications10.1007/978-3-030-53141-6_1(1-81)Online publication date: 25-Jul-2020
  • (2019)Introduction to Learning Automata ModelsLearning Automata Approach for Social Networks10.1007/978-3-030-10767-3_1(1-49)Online publication date: 23-Jan-2019

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and Security
August 2018
603 pages
ISBN:9781450364485
DOI:10.1145/3230833
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Universität Hamburg: Universität Hamburg

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 August 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Bandwidth Attacks
  2. Distributed Denial of Service (DDoS)
  3. Distributed Packet Filtering
  4. IP Traceback
  5. Learning Automata

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

ARES 2018

Acceptance Rates

ARES '18 Paper Acceptance Rate 128 of 260 submissions, 49%;
Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)An Introduction to Learning Automata and OptimizationAdvances in Learning Automata and Intelligent Optimization10.1007/978-3-030-76291-9_1(1-50)Online publication date: 24-Jun-2021
  • (2020)Varieties of Cellular Learning Automata: An OverviewCellular Learning Automata: Theory and Applications10.1007/978-3-030-53141-6_1(1-81)Online publication date: 25-Jul-2020
  • (2019)Introduction to Learning Automata ModelsLearning Automata Approach for Social Networks10.1007/978-3-030-10767-3_1(1-49)Online publication date: 23-Jan-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media