the correlation in the traffic; which may represent a
robust detection technique. Hussain et al. use the
spectral power density to identify the signatures for
different attacks (A. Hussain et al., 2003). Li and
Lee used wavelet-based system to calculate energy
distribution. They noticed that this distribution
presents peaks in the traffic which contains attacks
that do not exist in regular traffic (L. Li et G. Lee,
2003). Finally, A. Scherrer et al. proposed a
detection approach based on a non Gaussian and
multiresolution traffic modelling (A. Scherrer et al.,
2007). Anomalously large values observed on
calculated distances correspond to the occurrences
of illegitimate anomalies such as DDoS attacks.
The method proposed in this paper is also a
statistics-based method that utilizes traffic modelling
for DoS/DDoS detection. We aim at analyzing the
impact of anomalies on the statistical traffic
characteristics and to bring to evidence the traffic
characteristic signals containing legitimate and
illegitimate anomalies. We propose a bi-level study
of Internet traffic based on the couple packet IP,
address IP. By measuring the degree of coherence
between the number of packets and the number of IP
connexions first obtained in regular traffic, then in
traffics presenting a large variety of anomalies
including mainly legitimate anomalies, we can
differentiate traffic changes caused by legitimate
actions or by illegitimate actions. It will be shown
that the evolution of the estimated model’s
parameters allow to differentiate the traffic with or
without anomalies which minimises false alarms.
Other, our proposal does need to inspect only the
source IP address fields of each packet. This makes
it simpler and more practical for real-time
implementation.
The remainder of this paper is organized as
follows. Section 2 presents the real traffic traces
used in this work. Section 3 illustrates the theoretical
basis of a traffic coherence analysis model for DoS
detection. In section 4 we propose a stochastic
modelling of Internet traffic used to calculate the
degree of coherence. Section 5 discusses the
performance of our proposal. Finally concluding
remarks and future work are presented in Section 6.
2 CAIDA DATA COLLECTION
It is very hard to obtain anomaly-causing data
mainly when these flows are sensible and
susceptible to be used in real attacks as is the case
with DoS attack. The most part of works dealing
with DoS attacks use flows realized in laboratories
by means of traffic generator or by DDoS tools.
All along this work, we used a variety of real
Internet traffic traces collected in 2007. The DDoS
traces are issued from “The CAIDA Backscatter-
2007 Dataset” (https://data.caida.org/datasets/secu-
rity/backscatter-2007/). This collection groups the
backscatter datasets that were created from the
massive amount of data continuously collected from
the UCSD Network Telescope. These backscatter
datasets contain traces with packet headers for
unsolicited TCP and ICMP response packets sent by
denial-of-service attack victims. When a denial-of-
service-attack victim receives attack traffic with
spoofed source IP addresses, the attack victim
cannot differentiate between this spoofed traffic and
legitimate requests, so the victim replies to the
spoofed source IP addresses. These spoofed IP
addresses were not the actual sources of the attack
traffic, so they receive responses to traffic they never
sent. By measuring this backscatter response traffic
to a large portion of IP addresses (in our case,
roughly a /8 network), it is possible to estimate a
lower bound for the overall volume of spoofed
source denial-of-service attacks occurring on the
Internet. The normal traffic traces are issued from
“The CAIDA Anonymized 2007 Internet Traces
Dataset” (https://data.caida.org/datasets/passive-
2008/) This dataset contains anonymized passive
traffic traces from CAIDA's AMPATH monitor on
an OC12 link at the AMPATH Internet Exchange
during the DITL 2007 measurement event. Figure1
shows examples of network packet arrival process
for legitimate and illegitimate traffics. We can notice
a great variance in the aggregate traffic in
accordance with time. In figure (b), we signal an
important augmentation in the number of packets.
This is legitimate and is caused by a strong
augmentation in the number of IP connexions.
However, in the figure1 (c) the large scale
augmentation is illegitimate and is caused by DoS
attack using one sole zombie. The peak at the second
6500 corresponds to the appearance of a second
zombie.
3 DETECTION SYSTEM
Our detection system is based on the following
hypothesis: a permanent large scale augmentation in
the number of packets received by a network is the
consequence of the augmentation in the number of
IP connexions. An IP connexion corresponds to an
A TRAFFIC COHERENCE ANALYSIS MODEL FOR DDOS ATTACK DETECTION
149