Reference Hub3
Advanced Network Data Analytics for Large-Scale DDoS Attack Detection

Advanced Network Data Analytics for Large-Scale DDoS Attack Detection

Konstantinos F. Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj
Copyright: © 2017 |Volume: 7 |Issue: 3 |Pages: 11
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781522514077|DOI: 10.4018/IJCWT.2017070104
Cite Article Cite Article

MLA

Xylogiannopoulos, Konstantinos F., et al. "Advanced Network Data Analytics for Large-Scale DDoS Attack Detection." IJCWT vol.7, no.3 2017: pp.44-54. http://doi.org/10.4018/IJCWT.2017070104

APA

Xylogiannopoulos, K. F., Karampelas, P., & Alhajj, R. (2017). Advanced Network Data Analytics for Large-Scale DDoS Attack Detection. International Journal of Cyber Warfare and Terrorism (IJCWT), 7(3), 44-54. http://doi.org/10.4018/IJCWT.2017070104

Chicago

Xylogiannopoulos, Konstantinos F., Panagiotis Karampelas, and Reda Alhajj. "Advanced Network Data Analytics for Large-Scale DDoS Attack Detection," International Journal of Cyber Warfare and Terrorism (IJCWT) 7, no.3: 44-54. http://doi.org/10.4018/IJCWT.2017070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Internet-enabled devices or Internet of Things as it has been prevailed are increasing exponentially every day. The lack of security standards in the manufacturing of these devices along with the haste of the manufacturers to increase their market share in this area has created a very large network of vulnerable devices that can be easily recruited as bot members and used to initiate very large volumetric Distributed Denial of Service (DDoS) attacks. The significance of the problem can be easily acknowledged due to the large number of cases regarding attacks on institutions, enterprises and even countries which have been recently revealed. In the current paper a novel method is introduced, which is based on a data mining technique that can analyze incoming IP traffic details and early warn the network administrator about a potentially developing DDoS attack. The method can scale depending on the availability of the infrastructure from a conventional laptop computer to a complex cloud infrastructure. Based on the hardware configuration as it is proved with the experiments the method can easily monitor and detect abnormal network traffic of several Gbps in real time using the minimum hardware equipment.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.