Detecting Distributed Denial-of-Service Attacks by Analyzing TCP SYN Packets Statistically

Shingo ATA
Masayuki MURATA

IEICE TRANSACTIONS on Communications   Vol.E89-B    No.10    pp.2868-2877
Publication Date: 2006/10/01
Online ISSN: 1745-1345
DOI: 10.1093/ietcom/e89-b.10.2868
Print ISSN: 0916-8516
Type of Manuscript: PAPER
Category: Internet
Distributed Denial of Service (DDoS),  SYN Flood,  statistical analysis,  gamma distribution,  traffic monitoring,  

Full Text: PDF(899.1KB)>>
Buy this Article

Distributed denial-of-service attacks on public servers have recently become more serious. More are SYN Flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. To assure that network services will not be interrupted, we need faster and more accurate defense mechanisms against malicious traffic, especially SYN Floods. One of the problems in detecting SYN Flood traffic is that server nodes or firewalls cannot distinguish the SYN packets of normal TCP connections from those of SYN Flood attack. Moreover, since the rate of normal network traffic may vary, we cannot use an explicit threshold of SYN arrival rates to detect SYN Flood traffic. In this paper we introduce a mechanism for detecting SYN Flood traffic more accurately by taking into consideration the time variation of arrival traffic. We first investigate the statistics of the arrival rates of both normal TCP SYN packets and SYN Flood attack packets. We then describe our new detection mechanism based on the statistics of SYN arrival rates. Our analytical results show that the arrival rate of normal TCP SYN packets can be modeled by a normal distribution and that our proposed mechanism can detect SYN Flood traffic quickly and accurately regardless of time variance of the traffic.

open access publishing via