Statistical Application Fingerprinting for DDoS Attack Mitigation

Research output: Contribution to journalArticlepeer-review

77 Scopus citations

Abstract

Because of the dynamic nature of network traffic patterns, such as new traffic application arrivals or flash events, it is becoming increasingly difficult for conventional anomaly detection systems to separate various applications based on their traffic patterns. In this paper, by leveraging transport layer packet-level and flow-level features, new structures called application fingerprints are generated, which express such features in a compact and efficient manner. Based on the generated fingerprints, we propose a novel traffic classification framework. The proposed system generates profiles of normal applications using a multi-modal probability distribution. The proposed classification framework is then extended to detect distributed denial of service attacks from the collected statistical information at flow level. To demonstrate the feasibility of the proposed system, we evaluate its performance using five real-world traffic datasets. The experiment results show that the proposed method is capable of achieving an accuracy of over 97%, whereas the misclassification rate is only 2.5%.

Original languageEnglish
Article number8522048
Pages (from-to)1471-1484
Number of pages14
JournalIEEE Transactions on Information Forensics and Security
Volume14
Issue number6
DOIs
StatePublished - Jun 2019

Keywords

  • anomaly detection
  • DDoS attack detection
  • fingerprinting traffic applications
  • nonparametric clustering
  • Traffic classification

Fingerprint

Dive into the research topics of 'Statistical Application Fingerprinting for DDoS Attack Mitigation'. Together they form a unique fingerprint.

Cite this