skip to main content
research-article

Are Covert DDoS Attacks Facing Multi-Feature Detectors Feasible?

Published:20 January 2022Publication History
Skip Abstract Section

Abstract

We state and prove the square root scaling laws for the amount of traffic injected by a covert attacker into a network from a set of homes under the assumption that traffic descriptors follow a multivariate Gaussian distribution. We numerically evaluate the obtained result under realistic settings wherein traffic is collected from real users, leveraging detectors that exploit multiple features. Under such circumstances, we observe that phase transitions predicted by the model still hold.

References

  1. D. P. Bertsekas and J. N. Tsitsiklis. Introduction to Probability. Athena Scientific, 2008.Google ScholarGoogle Scholar
  2. B. Jiang, P. Nain, and D. Towsley. Covert cycle stealing in a single FIFO server. To appear in ACM ToMPECS. Preprint at arXiv:2003.05135, 2021.Google ScholarGoogle Scholar
  3. S. Kullback. Information Theory and Statistics. Dover Publications, 1968.Google ScholarGoogle Scholar
  4. E. L. Lehmann and J. P. Romano. Testing Statistical Hypotheses. Springer Science & Business Media, 2006.Google ScholarGoogle Scholar
  5. G. Mendon¸ca, G. H. A. Santos, E. de Souza e Silva, R. M. M. Leao, D. S. Menasche, and D. Towsley. An Extremely Lightweight Approach for DDoS Detection at Home Gateways. In 2019 IEEE International Conference on Big Data, pages 5012--5021, 2019.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGMETRICS Performance Evaluation Review
    ACM SIGMETRICS Performance Evaluation Review  Volume 49, Issue 2
    September 2021
    73 pages
    ISSN:0163-5999
    DOI:10.1145/3512798
    Issue’s Table of Contents

    Copyright © 2022 Copyright is held by the owner/author(s)

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 20 January 2022

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader