SCAFFY: A Slow Denial-of-Service Attack Classification Model Using Flow Data

SCAFFY: A Slow Denial-of-Service Attack Classification Model Using Flow Data

Muraleedharan N., Janet B.
Copyright: © 2021 |Pages: 23
DOI: 10.4018/IJISP.2021070107
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Denial of service (DoS) attack is one of the common threats to the availability of critical infrastructure and services. As more and more services are online enabled, the attack on the availability of these services may have a catastrophic impact on our day-to-day lives. Unlike the traditional volumetric DoS, the slow DoS attacks use legitimate connections with lesser bandwidth. Hence, it is difficult to detect slow DoS by monitoring bandwidth usage and traffic volume. In this paper, a novel machine learning model called ‘SCAFFY' to classify slow DoS on HTTP traffic using flow level parameters is explained. SCAFFY uses a multistage approach for the feature section and classification. Comparison of the classification performance of decision tree, random forest, XGBoost, and KNN algorithms are carried out using the flow parameters derived from the CICIDS2017 and SUEE datasets. A comparison of the result obtained from SCAFFY with two recent works available in the literature shows that the SCAFFY model outperforms the state-of-the-art approaches in classification accuracy.
Article Preview
Top

Introduction

As more and more services, including critical infrastructure, power grid, e-commerce, and transportation systems, are on-line enabled, attack on the availability of these services can have a catastrophic impact on our day to day life. Denial of Service (DoS) attack is a common attack target on the infrastructure and services. DoS is an attack on the availability of resources or system operations. In a DoS attack, a single attacker injects the attack traffic to overwhelm the target resources. A sophisticated version of DoS is called Distributed Denial of Service (DDoS). In DDoS, two or more attackers, like bot-net or compromised hosts, inject the attack traffic to a single target to disrupt or delay the services to the genuine users. Nowadays, DDoS attacks target the critical infrastructure, power grid, cloud infrastructure (Agrawal & Tapaswi, 2019), health care (Latif et al., 2014), IoT (Kolias et al., 2017), smart cities (Lee et al., 2019), media and entertainment services.

Based on the volume and duration of traffic, DoS attacks can be classified as High volume DoS (HDoS) and slow DoS (SDoS). HDoS targets the network infrastructure, including servers, routers, and switches, by sending a large volume of attack traffic generated using Network layer or Transport layer protocols. Compared to the normal traffic rate, the volume of HDoS traffic is enormous, and it has reached up to Terabytes/seconds rate (Institute & Akamai, 2017). Hence, HDoS can be detected by monitoring and analyzing the bandwidth usage and traffic volume.

In SDoS, the attacker sends partial requests to the server at a very low rate. The server needs to hold the resources for a longer period to process these requests, which subsequently blocks access to a legitimate user. In comparison to HDoS attacks, these attacks target the application layer and consume lesser network bandwidth. The slow DoS traffic and normal traffic have similar traffic volume and transmission speed. Hence, compared to the HDoS traffic, it is difficult to identify the SDoS traffic from normal traffic. The three main challenges to detect SDoS attack from legitimate traffic are (Hoque et al., 2015):

  • It uses valid connections during the attack.

  • Need a lesser number of connections to launch the attack.

  • Independent of the capabilities of the hardware of the host, SDoS attacks can overwhelm the resources.

By considering these challenges, adversaries are targeting HTTP servers to conduct slow DoS attacks. As HTTP is one of the prominent application layer protocols used in the Internet, slow DoS on HTTP server may have a large scale impact.

Researchers have analyzed the possibility of slow DoS attack on popular HTTP servers. A study on four different popular HTTP servers for their vulnerability against slow HTTP DoS attacks is discussed in (Tripathi et al., 2016). They observed that the slow HTTP DoS attacks are still a threat for many popular web servers. A study on web servers' queue scheduling policies against application layer DoS using simulators is presented (Kumar & Bhandari, 2017). Various surveys on the DoS and application layer DoS are available in the literature. Praseed et al. (Praseed & Thilagam, 2018) survey the application layer DDoS attacks. The survey concludes that application layer DoS is a significant security concern due to the difficulty in adopting the defense mechanisms against it. A survey on devising new techniques for countering HTTP-GET flood DDoS attacks is discussed in (Singh et al., 2017). A review of different detection methods for application layer DDoS is presented in (Jaafar et al., 2019). Various types of DoS attacks and preventive mechanisms against them are surveyed in (Nagesh et al., 2017).

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing