A reversible sketch-based method for detecting and mitigating amplification attacks
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.author | Jing, Xuyang | en_US |
dc.contributor.author | Zhao, Jingjing | en_US |
dc.contributor.author | Zheng, Qinghua | en_US |
dc.contributor.author | Yan, Zheng | en_US |
dc.contributor.author | Pedrycz, Witold | en_US |
dc.contributor.department | Department of Communications and Networking | en |
dc.contributor.groupauthor | Network Security and Trust | en |
dc.contributor.organization | Xidian University | en_US |
dc.contributor.organization | Xi'an Jiaotong University | en_US |
dc.contributor.organization | University of Alberta | en_US |
dc.date.accessioned | 2019-08-15T08:23:41Z | |
dc.date.available | 2019-08-15T08:23:41Z | |
dc.date.embargo | info:eu-repo/date/embargoEnd/2021-06-18 | en_US |
dc.date.issued | 2019-09-15 | en_US |
dc.description.abstract | Amplification attacks bring serious threats to network security due to their characteristics of anonymity and amplification. How to detect amplification attacks attracts more and more attention. However, as the age of networking for big data is coming, traditional amplification attack detection methods become inefficient due to the impact of big-volume network traffic that swamp significant signals of attacks. The premise of accurate effective attack detection is efficiently processing big-volume traffic. In this paper, we propose a meaningful work that applies sketch technique to detect and mitigate amplification attacks. This step enables the detection method to handle big-volume network traffic. We use a Chinese Reminder Theorem based Reversible Sketch to directly collect network traffic and then monitor the abrupt changes in one-to-one mapping between request packets and response packets to identify amplification attack traffic. The detection mechanism is robust and efficient since it does not need to record complicated traffic features and makes full use of the basic characteristic of amplification attacks. We examine the performance of our method through a series of experiments conducted on simulation and real world traffic. The results denote that the method can accurately detect and mitigate amplification attacks. | en |
dc.description.version | Peer reviewed | en |
dc.format.extent | 10 | |
dc.format.mimetype | application/pdf | en_US |
dc.identifier.citation | Jing, X, Zhao, J, Zheng, Q, Yan, Z & Pedrycz, W 2019, 'A reversible sketch-based method for detecting and mitigating amplification attacks', Journal of Network and Computer Applications, vol. 142, pp. 15-24. https://doi.org/10.1016/j.jnca.2019.06.007 | en |
dc.identifier.doi | 10.1016/j.jnca.2019.06.007 | en_US |
dc.identifier.issn | 1084-8045 | |
dc.identifier.issn | 1095-8592 | |
dc.identifier.other | PURE UUID: 62afeb76-86fe-4966-8429-e9d0e67318d1 | en_US |
dc.identifier.other | PURE ITEMURL: https://research.aalto.fi/en/publications/62afeb76-86fe-4966-8429-e9d0e67318d1 | en_US |
dc.identifier.other | PURE LINK: http://www.scopus.com/inward/record.url?scp=85067275359&partnerID=8YFLogxK | |
dc.identifier.other | PURE FILEURL: https://research.aalto.fi/files/35822738/ELEC_Jing_Reversible_sketch_based_JNCA.pdf | en_US |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/39682 | |
dc.identifier.urn | URN:NBN:fi:aalto-201908154727 | |
dc.language.iso | en | en |
dc.publisher | Elsevier | |
dc.relation.ispartofseries | Journal of Network and Computer Applications | en |
dc.relation.ispartofseries | Volume 142, pp. 15-24 | en |
dc.rights | openAccess | en |
dc.subject.keyword | Amplification attacks | en_US |
dc.subject.keyword | Bloom filter | en_US |
dc.subject.keyword | Chinese remainder theorem | en_US |
dc.subject.keyword | Network security | en_US |
dc.subject.keyword | Reversible sketch | en_US |
dc.title | A reversible sketch-based method for detecting and mitigating amplification attacks | en |
dc.type | A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä | fi |
dc.type.version | acceptedVersion |