A Novel DoS and DDoS Attacks Detection Algorithm Using ARIMA Time Series Model and Chaotic System in Computer Networks PDF
A Novel DoS and DDoS Attacks Detection Algorithm Using ARIMA Time Series Model and Chaotic System in Computer Networks PDF
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LCOMM.2016.2517622, IEEE
Communications Letters
1
Abstract—This article deals with the problem of detecting DoS network attacks. Frequently, time series models such as AR,
and DDoS attacks. First of all, two features including number of ARMA, FARIMA, etc. are used as proper tools for time series
packets and number of source IP addresses are extracted from forecasting [9]. Zhang et al. [3] proposed a prediction method
network traffics as detection metrics in every minute. Hence,
a time series based on the number of packets is built and based on an ARIMA model to predict DDoS attack through
normalized using a Box-Cox transformation. An ARIMA model is simulation studies with NS2. Yaacob et al. [4] introduce a
also employed to predict the number of packets in every following novel algorithm through using an ARIMA technique to detect
minute. Then, the chaotic behavior of prediction error time series potential attacks that may occur in computer networks. Their
is examined by computing the maximum Lyapunov exponent. method provide an early warning mechanism for the network
The local Lyapunov exponent is also calculated as a suitable
indicator for chaotic and non-chaotic errors. Finally, a set of administrator. Fachkha et al. [5] proposed an approach that
rules are proposed based on repeatability of chaotic behavior and is presented by a DDoS forecasting model. Anjali [6] and
enormous growth in the ratio of number of packets to number Chen et al. [7] -as the first step- perform preprocessing on the
of source IP addresses during attack times to classify normal network traffic by calculating the cumulative average of time
and attack traffics from each other. Simulation results show that series values in the time domain. Then the local Lyapunov
the proposed algorithm can accurately classify 99.5% of traffic
states. exponent is used as a suitable DDoS indicator. They also
assumed that the prediction error of an AR model is chaotic.
Index Terms—DoS and DDoS detection, Chaos, Lyapunov Furthermore, they used a neural network to improve the DDoS
exponent, Time series
detection accuracy. Because the cumulative average cannot
stabilize the variance of the data, it is not an appropriate input
I. I NTRODUCTION to an AR model [7]. In [8] Wu and Chen validate that the
Network attacks by a malicious node aiming to deny access error of the traffic prediction has chaotic characteristics. They
to resources on computer networks are called availability predict the network traffic using an exponential smoothing
based attacks. These forms of attacks are one of the most model instead of the forecasting method used in NADA [7].
serious security threats affecting network resources [1]. They The forecasting method based on exponential smoothing may
are commonly recognized as denial-of-service (DoS) attack. be inefficient in terms of accuracy [9]. Ramaki et al. [11]
When the attack is launched by more than one attacker, it is proposed two real-time methods based on stream mining for
called a distributed denial-of-service (DDoS) attack. During the DDoS attack detection and predicting the next goal of
DoS attack, intruders destroy their target(s) by sending a large the attacker. In the methods, a probabilistic approach based
number of packets that prevent legal users from having access on the Bayesian network concept is used for learning the
to network nodes. Usually, giant servers are capable enough specification of DDoS attack pattern and detecting it in alert
to endure a basic DoS attack from a single machine without streams. In this paper, it is proposed to combine the Box-
suffering performance losses [1]. The ability of an organization Cox based preprocessing, the ARIMA modeling, chaos based
to detect and preserve itself against DoS and DDoS attacks is analysis, and applying defined rules of classification in order
vital for its success. Without suitable detection and prevention to improve the efficiency of DoS/DDoS detection.
methods, an organization would be damaged by DoS and The remainder of the paper is organized as follows. Section II
DDoS attacks and suffers financial losses and reputational describes the proposed detection algorithm. Section III shows
damages [1]. There has been much research on DoS and the experimental results. Finally, a conclusion is provided in
DDoS attacks in order to accurately detect them in computer Section IV.
networks. In the following, related papers are reviewed.
Chonka et al. [2] proposed a novel DDoS detection al-
II. THE PROPOSED DETECTION ALGORITHM
gorithm which uses self-similarity theory for network traffic
modeling. The DDoS attack is detected by computing the In this section, the proposed algorithm, called TNA, is
local Lyapunov exponent. Furthermore, they claimed that briefly reviewed in Algorithm 1. The detailed explanation is
a neural network could improve the detection rate of the provided afterwards.
1089-7798 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LCOMM.2016.2517622, IEEE
Communications Letters
2
A. Feature Selection
According to the number of packets in every minute (xi ), Fig. 3. Predicted values for time instants 101-960
the number of source IP addresses of network nodes in every
minute (Ii ), and dividing them to each other (yi = xi /Ii ), B. Data preprocessing Using Box-Cox
two time series (xi &yi ) are built as detection metrics Fig. 1
and Fig. 2 show these metrics, respectively. Since the non-constant variance is quite common in the time
series, data transformations are often used to improve the pre-
diction accuracy. A very popular type of data transformation to
deal with non-constant variance is the BoxCox transformation.
As a preliminary step before fitting an ARIMA model to time
series, the Box-Cox transformation has been recommended
in [9]. The one-parameter Box-Cox transformation of a time
series xi that depends on the power parameter α, is as follows:
{ (α)
x −1
(α) ( i α ), if α ̸= 0;
xi = (1)
ln(xi ), if α = 0.
The preprocessed data is denoted using xi .
1089-7798 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LCOMM.2016.2517622, IEEE
Communications Letters
3
Fig. 4. Error of predicted values for time instants 101-960 Fig. 5. The local Lyapunov exponent values for time instants 101-960
1089-7798 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LCOMM.2016.2517622, IEEE
Communications Letters
4
TABLE II
C OMPARISON B ETWEEN D ETECTION R ATES O F A LGORITHMS
1089-7798 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.