A Novel Topology Link-Controlling Approach for Active Defense of Nodes in Networks

With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS) attacks, or some peak traffic, poses a great threat to the security of the network. In this paper, a novel topology link control technique and mitigation attacks in real-time environments is proposed. Firstly, a non-invasive method of deploying virtual sensors in the nodes is built, which uses the resource manager of each monitored node as a sensor. Secondly, a general topology-controlling approach of resisting the tolerant invasion is proposed. In the proposed approach, a prediction model is constructed by using copula functions for predicting the peak of a resource through another resource. The result of prediction determines whether or not to initiate the active defense. Finally, a minority game with incomplete strategy is employed to suppress attack flows and improve the permeability of the normal flows. The simulation results show that the proposed approach is very effective in protecting nodes.

[1]  Uma Rathore Bhatt,et al.  DDOS Attack Aware DSR Routing Protocol in WSN , 2016 .

[2]  Geert Deconinck,et al.  A Four-StepTechnique forTackling DDoS Attacks , 2012, ANT/MobiWIS.

[3]  S. Selvakumar,et al.  Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems , 2013, Comput. Commun..

[4]  Steve Mansfield-Devine,et al.  The growth and evolution of DDoS , 2015, Netw. Secur..

[5]  Zeng Fan-hua Minority Game with Incomplete Strategies , 2006 .

[6]  Wu Xiaoping Active defense strategy selection based on non-zero-sum attack-defense game model , 2013 .

[7]  Zhiyang Li,et al.  Detecting DDoS attacks against data center with correlation analysis , 2015, Comput. Commun..

[8]  Krishan Kumar,et al.  A comprehensive approach to discriminate DDoS attacks from flash events , 2016, J. Inf. Secur. Appl..

[9]  Raimo Kantola,et al.  Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory , 2014, Comput. Secur..

[10]  Theodore Tryfonas,et al.  A game theoretic defence framework against DoS/DDoS cyber attacks , 2013, Comput. Secur..

[11]  Weifeng Chen,et al.  Flow level detection and filtering of low-rate DDoS , 2012, Comput. Networks.

[12]  Florian Malecki Simple ways to dodge the DDoS bullet , 2012, Netw. Secur..

[13]  Cheng Yang,et al.  The minority game with incomplete strategies , 2007 .

[14]  Vern Paxson,et al.  Computing TCP's Retransmission Timer , 2000, RFC.

[15]  C. Genest,et al.  Statistical Inference Procedures for Bivariate Archimedean Copulas , 1993 .

[16]  H. F. Chau,et al.  Minority game with peer pressure , 2004 .

[17]  Sankardas Roy,et al.  Mitigating congestion based DoS attacks with an enhanced AQM technique , 2015, Comput. Commun..

[18]  Richard E. Overill,et al.  Detection of known and unknown DDoS attacks using Artificial Neural Networks , 2016, Neurocomputing.

[19]  Marina Papatriantafilou,et al.  STONE: A streaming DDoS defense framework , 2015, Expert Syst. Appl..

[20]  Meng Chao,et al.  Neural network ensembles based on copula methods and Distributed Multiobjective Central Force Optimization algorithm , 2014, Eng. Appl. Artif. Intell..

[21]  Jinjun Chen,et al.  A confidence-based filtering method for DDoS attack defense in cloud environment , 2013, Future Gener. Comput. Syst..

[22]  Bill Ravens,et al.  An Introduction to Copulas , 2000, Technometrics.

[23]  Dong Seong Kim,et al.  Detection of DDoS attacks using optimized traffic matrix , 2012, Comput. Math. Appl..

[24]  L. Engqvist,et al.  Male birch catkin bugs vary copula duration to invest more in matings with novel females , 2015, Animal Behaviour.

[25]  Fang Chen,et al.  Prediction of stock markets by the evolutionary mix-game model , 2008 .

[26]  Ming Li,et al.  Change trend of averaged Hurst parameter of traffic under DDOS flood attacks , 2006, Comput. Secur..

[27]  Giovanna Devetag,et al.  A laboratory experiment on the minority game , 2003 .

[28]  Yasir Malik,et al.  Collaborative Peer to Peer Defense Mechanism for DDoS Attacks , 2011, ANT/MobiWIS.

[29]  Ki Hoon Kwon,et al.  DDoS attack detection method using cluster analysis , 2008, Expert Syst. Appl..

[30]  Miroslav Voznak,et al.  Whispering through DDoS attack , 2016 .

[31]  Vasilios Katos,et al.  Real time DDoS detection using fuzzy estimators , 2012, Comput. Secur..

[32]  Mansfield-DevineSteve The growth and evolution of DDoS , 2015 .

[33]  Abe Sklar,et al.  Random variables, joint distribution functions, and copulas , 1973, Kybernetika.

[34]  Martin J. Reed,et al.  Uniform DoS traceback , 2014, Comput. Secur..

[35]  Kannan Govindarajan,et al.  DDoS defense system for web services in a cloud environment , 2014, Future generations computer systems.

[36]  Jugal K. Kalita,et al.  An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection , 2015, Pattern Recognit. Lett..

[37]  Hannes Kazianka,et al.  Copula-based geostatistical modeling of continuous and discrete data including covariates , 2010 .

[38]  Wang Zu-x Fair and efficient network congestion control algorithm based on minority game with local information , 2014 .

[39]  Yi-Cheng Zhang,et al.  Emergence of cooperation and organization in an evolutionary game , 1997 .