Paper Abstract and Keywords |
Presentation |
2008-05-15 15:00
Evaluation for Detectability of Identifying the Anomalous Traffic Using Delta Traffic Shigeaki Harada, Ryoichi Kawahara, Noriaki Kamiyama, Tsuyoshi Kondoh, Keisuke Ishibashi (NTT), Shoichiro Asano (NII) NS2008-1 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
To mitigate the anomalous traffic such as DDoS attacks,
it is necessary to accurately identify the anomalous traffic sources.
To realize this, we have so far proposed a method of identifying flow groups
that cause large difference in traffic volume between before and after detecting occurrence of anomalies.
In this method, we regard such flow groups as anomalous traffic sources.
This method assumes that the traffic difference in each flow group occurs only when
the group contains anomalous traffic sources.
However, even when the group has only normal traffic, that is, it does not contain anomalous traffic sources,
the traffic difference may occur due to the time variation in normal traffic.
Thus, in this paper, we evaluate the effect of such variation on the accuracy of identifying anomalous traffic sources
and also show the effectiveness of our method. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Anomalous traffic / Collateral damage / DDoS attack / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 108, no. 31, NS2008-1, pp. 1-6, May 2008. |
Paper # |
NS2008-1 |
Date of Issue |
2008-05-08 (NS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
NS2008-1 |
Conference Information |
Committee |
NS |
Conference Date |
2008-05-15 - 2008-05-16 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Future University-Hakodate |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Traffic Modeling, Post-IP Networking, Network Control, Protocol Design, Network Simulation, etc. |
Paper Information |
Registration To |
NS |
Conference Code |
2008-05-NS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Evaluation for Detectability of Identifying the Anomalous Traffic Using Delta Traffic |
Sub Title (in English) |
|
Keyword(1) |
Anomalous traffic |
Keyword(2) |
Collateral damage |
Keyword(3) |
DDoS attack |
Keyword(4) |
|
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Shigeaki Harada |
1st Author's Affiliation |
Nippon Telegraph and Telephone corporation (NTT) |
2nd Author's Name |
Ryoichi Kawahara |
2nd Author's Affiliation |
Nippon Telegraph and Telephone corporation (NTT) |
3rd Author's Name |
Noriaki Kamiyama |
3rd Author's Affiliation |
Nippon Telegraph and Telephone corporation (NTT) |
4th Author's Name |
Tsuyoshi Kondoh |
4th Author's Affiliation |
Nippon Telegraph and Telephone corporation (NTT) |
5th Author's Name |
Keisuke Ishibashi |
5th Author's Affiliation |
Nippon Telegraph and Telephone corporation (NTT) |
6th Author's Name |
Shoichiro Asano |
6th Author's Affiliation |
National Institute of Informatics (NII) |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2008-05-15 15:00:00 |
Presentation Time |
25 minutes |
Registration for |
NS |
Paper # |
NS2008-1 |
Volume (vol) |
vol.108 |
Number (no) |
no.31 |
Page |
pp.1-6 |
#Pages |
6 |
Date of Issue |
2008-05-08 (NS) |
|