Filtration Model for the Detection of Malicious Traffic in Large-Scale Networks
This study proposes a capable, scalable, and reliable edge-to-edge model for filtering malicious traffic through real-time monitoring of the impact of user behavior on quality of service (QoS) regulations. The model investigates user traffic, including that injected through distributed gateways and...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2015
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/12716/1/Filtration%20Model%20for%20the%20Detection%20Of%20Malicious%20Traffic%20In%20Large-Scale%20Networks.pdf http://umpir.ump.edu.my/id/eprint/12716/ http://dx.doi.org/10.1016/j.comcom.2015.10.012 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | This study proposes a capable, scalable, and reliable edge-to-edge model for filtering malicious traffic through real-time monitoring of the impact of user behavior on quality of service (QoS) regulations. The model investigates user traffic, including that injected through distributed gateways and that destined to gateways that are experiencing actual attacks. Misbehaving traffic filtration is triggered only when the network is congested, at which point burst gateways generate an explicit congestion notification (ECN) to misbehaving users. To investigate the behavior of misbehaving user traffic, packet delay variation (PDV) ratios are actively estimated and packet transfer rates are passively measured at a unit time. Users who exceed the PDV bit rates specified in their service level agreements (SLAs) are filtered as suspicious users. In addition, suspicious users who exceed the SLA bandwidth bit rates are filtered as network intruders. Simulation results demonstrate that the proposed model efficiently filters network traffic and precisely detects malicious traffic |
---|