Application layer Distributed Denial of Service (DDoS) attacks are among the deadliest kinds of attacks that have significant impact on destination servers and networks due to their ability to be launched with minimal computational resources to cause an effect of high magnitude. Commercial and government Web servers have become the primary target of these kinds of attacks, with the recent mitigation efforts struggling to deaden the problem efficiently. Most application layer DDoS attacks can successfully mimic legitimate traffic without being detected by Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). IDSs and IPSs can also mistake a normal and legitimate activity for a malicious one, producing a False Positive (FP) that affects Web users if it is ignored or dropped. False positives in a large and complex network topology can potentially be dangerous as they may cause IDS/IPS to block the user's benign traffic. Our focus and contributions in this paper are first, to mitigate the undetected malicious traffic mimicking legitimate traffic and developing a special anti-DDoS module for general and specific DDoS tools attacks by using a trained classifier in a random tree machine-learning algorithm. We use labeled datasets to generate rules to incorporate and fine-tune existing IDS/IPS such as Snort. Secondly, we further assist IDS/IPS by processing traffic that is classified as malicious by the IDS/IPS in order to identify FPs and route them to their intended destinations. To achieve this, our approach uses active authentication of traffic source of both legitimate and malicious traffic at the Bait and Decoy server respectively before destined to the Web server.
[1]
Wanlei Zhou,et al.
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
,
2011,
IEEE Transactions on Information Forensics and Security.
[2]
Kensuke Fukuda,et al.
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking
,
2010,
CoNEXT.
[3]
Albert K. T. Hui,et al.
Kill ' em All-- DDoS Protection Total Annihilation !
,
2013
.
[4]
Yuan-Cheng Lai,et al.
False Positives and Negatives from Real Traffic with Intrusion Detection/Prevention Systems
,
2012
.
[5]
R. Anitha,et al.
Mitigation of Application Traffic DDoS Attacks with Trust and AM Based HMM Models .
,
2010
.
[6]
Mayank Agarwal,et al.
Mitigating denial of service attack using CAPTCHA mechanism
,
2011,
ICWET.
[7]
Hiroaki Hazeyama,et al.
Oblivious DDoS mitigation with locator/ID separation protocol
,
2014,
CFI '14.