
 
In summary, based on the fractal dimension 
histograms in Figure 19 the best separability can be 
provided if the aggregated number of destination 
addresses (shown in Figure 19 (b)) and the 
aggregated number of source ports (shown in Figure 
19 (c)) are both monitored.  The other signal 
parameters provide no additional information and 
have generally lower separability of normal network 
traffic from attack traffic. 
7 CONCLUSIONS 
This paper presented an approach to detecting 
Distributed Denial of Service attacks using fractal 
analysis of the phase space trajectories of the 
incoming network traffic. The paper demonstrated 
the key differences in behavior of attack traffic and 
normal network traffic when analyzed in phase 
space. The paper demonstrated the differences in the 
characteristics of port and addresses flooding 
attacks, and also demonstrated a negative correlation 
of the aggregated number of bytes relative to the 
aggregated number of ports or addresses referenced.  
The paper demonstrates these concepts on actual 
network traffic incoming to the University of 
Michigan-Flint when it was under a test attack from 
the University of Michigan-Ann Arbor. 
The results highlighted in the paper demonstrate 
there is significant separability between normal 
traffic and network traffic when analyzing the 
aggregated number of source ports and the 
aggregated number of destination addresses. The 
paper defined an optimal set of values for the key 
parameters related to analyzing these signals in 
phase space, namely: (i) the length of the 
aggregation window, (ii) the length of the data 
analysis window, (iii) the length of low-pass filter, 
and (iv) the time lag between samples used to build 
the phase space trajectories. These values can be 
used to develop an embedded DDOS detection 
algorithm in network routers. The paper 
demonstrated the efficacy of using the Information 
Dimension measure for detecting the changes in the 
fractal nature of the phase space trajectories of the 
normal and attack traffic. Future work will be 
directed at implementing a detection and attack 
packet removal algorithm based on the fractal 
dimension of the incoming signals and developing 
complete Receiver Operating Characteristics (ROC) 
curves. 
ACKNOWLEDGEMENTS 
The authors would like to thank Dr. Stephen Turner, 
Anthony Wingett from the Computer Science, 
Engineering, and Physics department, and Josh 
Weber and the entire University of Michigan-Flint 
Information Technology Services organization for 
assisting in the data collection process. 
REFERENCES 
Hu, J. Gao, and N. S. Rao, 2007. Defending against 
internet worms using a phase space method from 
chaos theory. In SPIE Proceedings # 6570, Data 
Mining, Intrusion Detection, Information Assurance, 
and Data Networks Security, SPIE. 
M. Li, Y-Y Zhang, and W. Zhao, 2008. A practical 
method for weak stationarity test of network traffic 
with long-range dependence. In Proceedings of the 8th 
WSEAS International Conference on Multimedia 
Systems and Signal Processing, IEEE. 
H. Liangxiu, C. Zhiwei, C. Chunbo, and G. Chuanshan, 
2002. A new multifractal network traffic model. In 
Chaos, Solitons and Fractals, Elsevier. 
M. Masugo, 2002. Multi-fractal analysis of IP-network 
traffic based on a hierarchical clustering approach. In 
Communications in Nonlinear Science and Numerical 
Simulation, Elsevier. 
M. Li and W. Zhao, 2008. Detection of variations of local 
irregularity of traffic under DDOS flood attack. In 
Mathematical Problems in Engineering, Hindawi. 
D. Gregg, W. Blackert, D. Heinbuch, and D. Furnanage, 
2001. Assessing and quantifying denial of service 
attacks. In Proceedings IEEE Military 
Communications Conference, IEEE. 
M. Li, 2006. Change trend of averaged Hurst parameter of 
traffic under DDOS flood attacks. In Computers & 
Society. 
A. Piskozub, 2002. Denial of service and distributed 
denial of service attacks, In Proceedings of 
International Conference on Modern Problems of 
Radio Engineering, Telecommunications and 
Computer Science, IEEE. 
Y. Xiang, Y. Lin, W. L. Lei, and S. J. Huang, 2004. 
Detecting DDOS attack based on network self-
similarity. In IEE Proc. Communications, IEE.  
L. Limwiwatkul and A. Rungsawang, 2004. Distributed 
denial of service detection using TCP/IP header and 
traffic measurement analysis. In Proc. International 
Symposium on Communications and Information 
Technologies, IEEE.  
A. Mitrokotsa and C. Douligeris, 2005. Detecting denial of 
service attacks using emergent self-organizing maps. 
In  Proc. IEEE International Symposium on Signal 
Processing and Information Technology, IEEE. 
G. Oke, G. Loukas, and E. Gelenbe, 2007. Detecting 
denial of service attacks Bayesian classifiers and 
SECRYPT 2011 - International Conference on Security and Cryptography
88