An Adversary-Centric Behavior Modeling of DDoS Attacks
Title | An Adversary-Centric Behavior Modeling of DDoS Attacks |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Wang, A., Mohaisen, A., Chen, S. |
Conference Name | 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) |
Keywords | Adversary Models, adversary-centric behavior model, Analytical models, Computer crime, computer network security, Data-driven approach, DDoS attack model, distributed denial of service attack, feature extraction, Human Behavior, industrial mitigation operation, Internet, Malware, Metrics, Monitoring, Predictive models, pubcrawl, resilience, Resiliency, Scalability |
Abstract | Distributed Denial of Service (DDoS) attacks are some of the most persistent threats on the Internet today. The evolution of DDoS attacks calls for an in-depth analysis of those attacks. A better understanding of the attackers' behavior can provide insights to unveil patterns and strategies utilized by attackers. The prior art on the attackers' behavior analysis often falls in two aspects: it assumes that adversaries are static, and makes certain simplifying assumptions on their behavior, which often are not supported by real attack data. In this paper, we take a data-driven approach to designing and validating three DDoS attack models from temporal (e.g., attack magnitudes), spatial (e.g., attacker origin), and spatiotemporal (e.g., attack inter-launching time) perspectives. We design these models based on the analysis of traces consisting of more than 50,000 verified DDoS attacks from industrial mitigation operations. Each model is also validated by testing its effectiveness in accurately predicting future DDoS attacks. Comparisons against simple intuitive models further show that our models can more accurately capture the essential features of DDoS attacks. |
URL | http://ieeexplore.ieee.org/document/7980053/ |
DOI | 10.1109/ICDCS.2017.213 |
Citation Key | wang_adversary-centric_2017 |
- industrial mitigation operation
- Scalability
- Resiliency
- resilience
- pubcrawl
- Predictive models
- Monitoring
- Metrics
- malware
- internet
- Adversary Models
- Human behavior
- feature extraction
- distributed denial of service attack
- DDoS attack model
- Data-driven approach
- computer network security
- Computer crime
- Analytical models
- adversary-centric behavior model