520 International Journal of Fuzzy Systems, Vol. 16, No. 4, December 2014 Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed G. Preetha, B. S. Kiruthika Devi, and S. Mercy Shalinie Abstract1 leaving no trace of their appearance in the network and thus making their detection very difficult. Distributed Distributed Denial of Service (DDoS) attacks im- Denial of Service (DDoS) attack is classified as a repinge on the availability of critical resources in the source and bandwidth exhaustion attack [1]. In most Internet domain. The objective of this paper is to de- cases, attackers spoof IP addresses to evade source idenvelop an autonomous agent based DDoS defense in tity. Enormous packets bombard at the network, targetreal time without human intervention. A mathemati- ing routers, servers, and firewalls and preventing legitical model based on Lanchester law has been designed mate users from operating their normal services. Packto examine the strength of DDoS attack and defense et-flooding is a form of bandwidth exhaustion attack group. Once attack strength is formulated efficient where attacker’s intention is to bombard TCP, UDP, defense mechanism is deployed at the victim to block ICMP, DNS, HTTP packets to the target server [2]. Any malicious flows. The proposed framework is vali- computer in the network can be easily compromised by dated in an experimental testbed with geographically DDoS attacks without any knowledge of being attacked. distributed testbed nodes. From the experimental re- Efficient and publicly available online resources such as sults, the strength of attack group is observed as automated DDoS attack tools like Trinoo, TFN, TFN2K, 49%. The defense strength of Hop Count Filtering mstream, Stacheldraht, Shaft, Trinity, Knight etc., do not mechanism is obtained as 31.3% whereas the pro- require technical knowledge to launch a high rate floodposed Hybrid Model defense effectiveness is com- ing attack. The victims are surprisingly government puted as 48.7%. Also, Adaptive Bandwidth Manage- agencies, financial corporations, defense agencies and ment (ABM) using fuzzy inference system provides military departments. Popular websites like facebook, sustainable bandwidth to legitimate users by provid- twitter, wikileaks, paypal and ebay became DDoS vicing low bandwidth share for attackers. The proposed tims. The attack interrupted their normal operation leadautonomous agent based model defends against ing to financial losses, service degradation and lack of DDoS attack in various aspects like prevention of IP availability [3]. spoofing, effective bandwidth management, imAgents play a vital role in the recent research involvprovement of Quality of Service provisioning, avail- ing Artificial Intelligence and Expert Systems [4]. ability of services to legitimate clients and protecting Agents can be further classified into Hardware and critical infrastructure points. The defense mechanism Software agents [5]. The later is a software program paves way to Critical Information Infrastructure which works irrespective of the operating platform. AuProtection. tonomous agents function independently and act in response to attacks without any human intervention. ExKeywords: Adaptive bandwidth management, autono- tensive efforts of the researchers in solving these attacks mous agent, DDoS, lanchester law, testbed. get often exhausted in designing an agent according to their own requirements. Software agent when properly 1. Introduction designed has the ability to act on behalf of its users autonomously. Autonomous agent is a software agent Most modern attacks or intrusions are very intelligent, which resides on the victim machine and gets activated only when the DDoS attack strikes the target network. Corresponding Author: G. Preetha is with the Department of Com- Since the agent is placed at the victim level, there is no puter Science and Engineering, Thiagarajar College of Engineering, need to deploy distributed cooperative agents and cenMadurai, Tamilnadu, India, 625 015. tralized controller. Agent usage is currently being enE-mail: [email protected] B. S. Kiruthika Devi and S. Mercy Shalinie are with the Department couraged by Intrusion Detection System (IDS) for its of Computer Science and Engineering, Thiagarajar College of Engi- fast detection, easy transportation, minimal complexity neering, Madurai, Tamilnadu, India, 625 015. etc. The software agent probes the detection system for E-mail: [email protected]; [email protected] Manuscript received 12 May 2014; revised 11 July 2014; accepted 16 any suspicious attack sources. SNMP MIB data are used for DDoS symptom analysis and its fast detection. This Sep. 2014. © 2014 TFSA G. Preetha et al.: Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed triggers the agent to drop all attack packets using the drop list being generated every now and then. Upon detection, each DDoS attack source IP is logged into the drop list by the hybrid system. In the shortest possible time, the agents act rapidly so as to drop all the malicious sources, thereby saving the victim from overwhelming surge traffic. Fuzzy system plays a vital role in complex non linear systems [6], when there is a difficulty in designing a mathematical model. Attackers use IP spoofing as a weapon to disguise their identity and the spoofed traffic also follows the same principle as normal traffic. Qualitative description of the detection with fuzzy estimators at mean packet inter arrival time was proposed in [7] instead of statistical descriptors. DDoS attack with malicious IP is detected and discarded before the victim suffers from resource exhaustion. The arrival time is used as a main metric to discriminate the DDoS traffic. The problem faced by this method is that a single metric alone cannot be sufficient to distinguish normal traffic from an attack. Existing mechanisms defend DDoS attacks qualitatively but not quantitatively [8-10]. Thus, the need for mathematical analysis on vulnerability exploited by DDoS attacks and scarce of intelligent agents to defend against DDoS attacks in real time, motivated us to propose an autonomous agent based solution to defend DDoS attacks. The contributions of this paper are: i) A testbed infrastructure has been developed to carry out realistic DDoS experimentation with different traffic generators and the dataset. ii) Mathematical model is formulated to evaluate the DDoS attack strength in quantitative terms which enables a defender to calculate the impact analysis of DDoS attacks and deploy mitigation algorithms accordingly for ending the combat. iii) Proof-of-concept for the formulated mathematical model is validated by generating traffic in the experimental testbed. Chosen metrics are monitored online before and after DDoS attack. The degradation in the observed metrics is evaluated to define the strength of the attack. iv) Hybrid DDoS attack detection technique has been designed and implemented. This technique tests the incoming network traffic in real time to segregate malicious traffic from the legitimate one. The subsets of attack traffic are further classified and trained for protocol exploit attacks. The detection accuracy is increased with low false positive rate. v) DDoS attack traffic has been weeded out automatically at the victim’s end with the help of intelligent agents. In this paper, a framework has been proposed which acts as a platform for the researchers to quantitatively detect, mitigate and defend DDoS attacks in real time. 521 2. Related Work Single metric alone [11] cannot exemplify the impact of Denial of Service (DoS) attack. The rate of false alarms is high because it detects attacks with the information from single performance metric. Instead of using a single metric [12] to detect the DoS attack, multiple metrics are to be attempted to derive conclusions that the victim is suffering from flooding attack. Multiple metrics are analyzed [9-10] to study the impact of DDoS attack and service deterioration. Anomalies are noticed by online monitoring of host based (CPU, Memory Usage) and network based (Latency, Link Utilization, Packet Arrival Rate, Throughput) performance metrics [13] to suspect the DDoS attack. Comprehensive survey to discover and defend DDoS attacks, security challenges and research problems were detailed in [14-15]. DDoS attack incidents, motivations behind the attack, their impacts and vulnerabilities are surveyed in [16]. The researchers have illustrated various attack detection and defense algorithms and the necessity of formulating a statistical prototype. Quarantined intrusion detection is nightmare for security analysts when the attack is launched from several compromised nodes called botnets. To overcome the issue, topology oriented collaborative IDS was proposed in [17] to elude DDoS attacks. Stream-based DDoS defense framework [18] provides anomaly based detection by analyzing the traffic features and mitigation of DDoS attacks. Traffic features are extracted by streaming queries and compared with the features mentioned in the historical dataset. However, the method doesn’t differentiate legitimate from illegitimate traffic and also does not examine the reason for anomalies. A Confidence Based Filtering (CBF) method [19] uses the correlation between IP and TCP headers as the attribute value pairs to distinguish attack packets from normal. CBF score is calculated based on the weighted average of confidence among attribute pairs. The CBF method will fail to filter the attack packets when the attacker mimics the correlation characteristics of the attribute value pair. In case of high rate of flooding attack, the response, accuracy and the speed of the filtering mechanism need to be analyzed. Hadoop based DDoS defense mechanism was proposed in [20], which uses the Map Reduce programming model to detect DDoS. Time interval, threshold and unbalance ratio are given as input to file system with the help of packet loader. The algorithm should be further optimized. Moreover it lacks practical implementations. Proactive surge protection [21] provides bandwidth isolation for the traffic flows that are not under attack, reducing the collateral damage. Two differentiated priority classes are formulated at the network perimeter, where packets are tagged as high if the arrival rate is lower than 522 International Journal of Fuzzy Systems, Vol. 16, No. 4, December 2014 threshold and low priority when it is greater. Low priority packets are preferentially dropped when the network link is saturated. The preferential dropping does not happen when the network conditions are normal with packets being forwarded routinely. LOT [22] is a lightweight tunneling protocol, which is used to discard spoofing IP packets and flooding packets kind of attacks. Deploying this algorithm at network gateways mitigate DNS poisoning, network scans and Distributed Denial of Service (DDoS) attacks. Adaptive Selective Verification [23] is designed to thwart DDoS attacks, based on selective verification using a distributed adaptive mechanism. The server uses random sampling method and processes legitimate user’s request to avoid bandwidth consumption by the attackers. However this algorithm lacks practical implementations and it eliminates bandwidth consumption attacks only. Discrete wavelet transforms methodology is used to find out the statistical analysis of the incoming network traffic. Hurst parameter metric was analyzed using Schwarz Information Criterion (SIC) and intelligent fuzzy technology in [24]. These algorithms are outside the purview of proof-of-concept implementations. An adaptive and cooperative defense mechanism against Internet attacks with multi-agent framework was proposed in [25]. Interactive intelligent agents act according to the compliance based on the network conditions and the severity of the attack. The main drawback in this approach is that the cooperation between routers is mandatory. Botnet analysis and defense framework was proposed in [26] where agents collect information from different sources, to forecast the intentions and to deceive the agents of computing team. Its major drawback is that it lacks practical implementations and also requires cooperation among ISP. A Multi agent system based on Artificial Neural Networks was proposed in [27] to detect intrusions in dynamic networks that guarantee computer network security architecture. A deliberative agent with flexible and adaptable architecture is designed to identify intrusions by probing anomalous situations with the help of SNMP. Traffic Rate Analysis (TRA) for TCP attack is envisaged based on tcp flags by Rule Based Inductive Learning approach [28]. To summarize, the above mentioned schemes lack in quantitative measurement, real time deployment, autonomous agent and routers co-operation. In this paper, an autonomous agent based DDoS defense framework is proposed to identify the attacker’s strength and to choose a defense strategy to overcome it. 3. Proposed Model An overall framework for DDoS defense using autonomous agent is proposed as shown in Figure 1. This framework comprises of following major components 1) Traffic Generation Agent 2) Monitoring Agent 3) Analyzer Agent 4) Detection Agent and 5) Decision Agent. Distributed attack traffic is generated in an experimental testbed from various sites with the help of the traffic generation agent. The anomalies are inferred online with the peak increase or drop in the network traffic using the monitoring agent. The analyzer agent incorporates Lanchester law to quantitatively analyze the strength of attack and defense group. The detection agent deploys appropriate detection algorithm and triggers the filtering module to drop the malicious flows at the router itself. Finally the decision agent derives conclusion so as to provide sustainable bandwidth for legitimate users and minimal bandwidth for attackers. Decision Agent Decision Detection Agent Hybrid Model HCF SVM Adaptive Bandwidth Management MLP Monitoring Agent Monitoring Analyzer Agent Analyzer Host HostMetrics Metrics Network NetworkMetrics Metics CPU Usage Packet Loss Memory Usage Latency Link utilization Throughput Lanchester Combat Model Traffic Generation Agent Distributed Testbed Attacker 1 UDP Site I Attacker 2 ICMP Site II Attacker 3 TCP SYN Site III Attacker 4 TCP SPOOF Site IV Figure 1. Autonomous agent based DDoS defense framework. A. Traffic generation agent Testbed has been developed to meet the emerging vulnerabilities in cyber society. It is distributed among sites in eight collaborative institutions across various geographical locations connected through MPLS-VPN cloud as shown in Figure 2. G. Preetha et al.: Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed 523 Monitoring Agent CPU Usage Host & Network Based Performance Metrics Memory Usage Packet Loss Latency Link Utilization Throughput Figure 4. Online monitoring system. Figure 2. Distributed testbed environment. Traffic generation, monitoring and management are enabled through the testbed nodes. Emulated DDoS attacks using modest hardware resources are achieved by experimental testbed. DDoS detection and defense solutions are validated using this testbed for protecting critical infrastructure from DoS attacks. Traffic generation was carried out in the testbed with automated tools, command line arguments and user written scripts. Network layer attacks like TCP, UDP, ICMP and TCP SYN flooding packets are pumped into the victim network. Figure 3 depicts the DDoS attack scenario wherein the victim at site V is attacked by four different types of attacks such as UDP flooding, ICMP flooding, TCP SYN and TCP SPOOF simultaneously. Bandwidth along the consortium nodes is 2 Mbps and attack time is set to 120 seconds. Figure 3. DDoS attack scenario. B. Monitoring agent Traffic traces are monitored in an experimental testbed through monitoring agent. The DDoS effect is monitored with the help of performance metrics like CPU usage, memory usage, packet loss, latency, link utilization and throughput [15] as shown in Figure 4. Measuring single metric will lead to false alarms. So, multiple metrics are monitored by monitoring agent to compute the deprivation of web servers experienced in attacking mode. C. Analyzer agent In heterogeneous network like the Internet, it is hard to classify the legitimate and attack traffic where experimenters depend on quantitative model. Predicting and forecasting attacks lead to the efficient defense system design to throttle DDoS attacks. Lanchester law is used to calculate the relative strengths of Attack/Defense group. Its application is validated for DDoS attack which is a great threat to cyber security. F.W. Lanchester formulated a mathematical model to analyze the strength of attack and defense group in warfare [29-30]. DDoS attack consist of two groups namely attack group X and defense group Y . Let xt and y t define the strength of the DDoS attack group X and defense group Y at time t . Attack group X considers traffic intensity as the major parameter. Similarly the Defense group y considers defense effectiveness to combat DDoS attack [31]. The strength of each group depends on the product of size of both parties. dx dy (1) xy xy dt dt where x , y is the group size of attack group and defense group respectively. is the rate that a defense group can mitigate the attack strength and is the rate that an attack group can deteriorate the defense strength. Applying chain rule followed with integration, the state equation is obtained as: (2) y y 0 x x0 The fighting strength of defense group is higher when (3) y x A General Model [31] is developed to show that a group’s attrition rate may be affected by its own size and fighting abilities. is the rate at which group size is reduced over a period of time and is the rate at which individual fighting ability is reduced over a period of time. State equations and diminishing functions are introduced and then the equations in [24] are solved to arrive at equation (4). Thus, defense group wins if, 524 International Journal of Fuzzy Systems, Vol. 16, No. 4, December 2014 1 1 y x y Ax (4) F x y x Ay When the individual fighting ability reduces by a factor of ‘ ’, then the strength of the group also reduces accordingly [31]. By rearranging and substituting =1 in equation (4), equation (5) is evolved. r 1 Ar (5) Ar The group size is ‘1’ because detection and defense is carried out at the victim’s network [32]. are observed as in [33]. When the source IP is found in IP2HC table the incoming packet is tagged as legitimate else it is tagged as spoofed. D.2. Hybrid model (SVM-MLP) The traffic samples are fed to the Support Vector Machine (SVM) classifier to evaluate its performance with high detection accuracy and low false positive rate. Host and Network metrics say latency, link utilization, CPU usage, memory usage, packet arrival rate and throughput are input to SVM model which discriminates attack traffic from benign traffic. If the victim host is confirmed to be under attack, the next step is to find the potential atD. Detection agent tackers. The online monitoring system is probed further The online monitoring system is probed further to to gather information about the attackers that the SVM gather information about the attackers using spoofed IP model has listed. The vital information about the attackaddress, high traffic senders with source address, traffic ers such as IP flow statistics per protocol is fed into intensity, volume and protocol type. An efficient detec- Multi Layer Perceptron (MLP) classifier. Since the MLP tion algorithm for detecting spoofed traffic before Model is already updated with attack signatures, it is reaching the target is very essential. now capable of finding the kind of flooding attack that is being initiated to deny legitimate requests, by consuming D.1. Hop count filtering algorithm system and network resources of the victim. Incoming Packets E. Decision agent Six MIB variables are observed and they are from TCP, UDP and ICMP groups. The variables that are of Infer Source IP & TTL (Tf) interest from those groups are tcpAttemptFails, tcpOutRsts, udpInErrors, icmpInErrors, icmpOutMsgs Get Initial TTL Ti and icmpOutDestUnreachs. Changes in SNMP MIB variables statistics are observed when the bogus traffic reaches the victim. SNMP MIB collector collects the Compute Hop Count Hc=Ti-Tf SNMP MIB data on the victim system at different layers and protocols. The excessive monitoring information is exploited for the detection of flooding style of attacks. Search Stored Hop Count Hs Six MIB variables are collected using the SNMP MIB collector, which constantly increments the value accordingly as the incoming/outgoing traffic increases enorY Hc = Hs Accept Packet mously. Since DDoS attack is very aggressive and overwhelms the victim network by seemingly legitimate N packets, the SNMP MIB data is updated frequently in a very short interval of time. The duration in which the Drop Packet victim network is probed for data, is kept as 5 seconds. Figure 5. Hop Count Filtering algorithm. Figure 6 shows the proposed Adaptive Bandwidth Management (ABM) system based on fuzzy inference to Time to Live (TTL) field is the unique parameter to regulate efficient bandwidth allocation based on subsets check the number of hops required to reach the destina- of attack traffic. tion. This information is available in the IP header and The subsets of attack traffic TCP, UDP and ICMP cannot be modified by the attacker since it is dependent flooding segregated from MLP is input to ABM algoon Operating System (OS) and routing protocols. The rithm for further rule based decisions to make adaptive hop count and the source IP is stored in IP2HC table bandwidth allocation. The SNMP-MIB variables for TCP, when the target network is operating in normal mode. UDP and ICMP flows are inputted to fuzzy inference The flowchart for the Hop Count Filtering algorithm system and it provides low bandwidth share for attackers shown in Figure 5, computes the hop count by finding and high bandwidth for legitimate users as shown in the difference between final and initial TTL Values. The Figures 7-9. initial TTL values are based on the OS and TTL values 525 G. Preetha et al.: Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed mitigated by online filtering of malicious source IP’s immediately after detection. To evaluate the detection accuracy of the chosen classifiers, True Positive (TP), False Positive (FP), precision, recall, F-measure and accuracy metrics are observed. Table 1 shows the performance metrics for hybrid model. Table 1. Hybrid model output. Figure 6. Proposed Adaptive Bandwidth Management. Input: tcp_out_rsts,tcp_attempt_fails Output: bw_alloc If (tcp_out_rsts is high && tcp_attempt_fails is high) then {bw_alloc is low;} else {bw_alloc is high;} Figure 7. Pseudo code for allocating bandwidth for TCP flows. Input: Udp_in_err Output: bw_alloc If (udp_in_err is high) then {bw_alloc is low;} else {bw_alloc is high;} Metrics SVM Output MLP Output Normal 1 Attack 0.974 TCP 1 UDP 1 ICMP 0.933 0.026 0 0.056 0 0 0.962 1 1 0.974 0.993 1 1 1 1 0.933 F-Measure 0.98 0.987 0.977 1 0.966 Accuracy 98.42% True Positive (TP) False Positive (FP) Precision Recall 99.39% The combat model facilitates to recover the target from DDoS attack by deploying efficient defense solution terminating the combat. The proposed combat model is analyzed and its defense effectiveness using HCF and Hybrid model in real time is depicted as in Figure 10. Figure 8. Pseudo code for allocating bandwidth for UDP flows. Input: icmp_in_err, icmp_in_msg,icmp_out_unreach Output: bw_alloc If (icmp_in_err is high && icmp_in_msg is high && Icmp_out_unreach) is high) then {bw_alloc is low;} else {bw_alloc is high;} Figure 9. Pseudo code for allocating bandwidth for ICMP flows. 4. Results and Discussions In this paper, a victim based solution is proposed to proactively detect DDoS attacks without the involvement of intermediate routers. The attack strength evaluated through online monitoring system is 49% (α = 49%) for the attack scenario that has been considered using distributed testbed. The HCF effectiveness is evaluated as 31.3% (β = 31.3%). By enabling hybrid model the defense strength is computed as 48.7% with low false positive rate. The DDoS attack is detected quickly and Figure 10. Effectiveness of attack and defense strength. Finally, it is necessary that the bandwidth has to be managed adaptively to allow access to services for legitimate users. Adaptive bandwidth management (ABM) algorithm takes real time input of tcp, udp and icmp flood and allocates bandwidth accordingly. Based on TCP, UDP and ICMP packet rate if the incoming packet rate is high bandwidth allocation is low and vice versa as shown in Figures 11-13. 5. Conclusion & Future Enhancements In this paper, a mathematical model has been formulated to analyze the vulnerability of DDoS attacks quantitatively for DDoS detection, mitigation and defense. 526 International Journal of Fuzzy Systems, Vol. 16, No. 4, December 2014 [2] Figure 11. Bandwidth Allocation for TCP flow. [3] [4] Figure 12. Bandwidth Allocation for ICMP flow. [5] [6] [7] Figure 13. Bandwidth Allocation for UDP flow. Then proof-of-concept for the proposed mathematical model has been validated by quantitatively (i) analyzing the strength of attacker and defender (49%) (ii) demonstrating the model for DDoS attack scenario (iii) measuring the effectiveness of DDoS detection techniques such as HCF and hybrid model with 31.3% and 48.7% respectively. iv) allocating the bandwidth adaptively to legitimate users by ABM algorithm. The outcome of this proposed work will act as a prototype which will enable researchers to: (i) estimate the strength of the attack and (ii) deploy their own defense mechanisms at the victim. Future enhancement of the proposed work is to: (i) build resilient network architecture to prevent DDoS attacks by upgrading critical infrastructure protection. (ii) provide continuous operability and monitoring for critical services during DDoS attacks. (iii) optimize cost, reaction time and overhead complexity. [8] [9] [10] [11] [12] References [1] S. M. Specht and R. B. Lee, “Distributed denial of service: Taxonomies of attacks, tools and countermeasures,” in Proc. 17th International Conference [13] on Parallel and Distributed Computing Systems, San Francisco, California, USA, 2004, pp. 543-550. J. Mirkovic and P. Reiher, “A taxonomy of DDoS attacks and defense mechanisms,” ACM SIGCOMM Computer Communications Review, vol. 34, pp. 39-54, 2004. Ketki Arora, Krishnan Kumar, and Monika Sachdeva, “Impact analysis of recent DDoS attacks,” International Journal of Computer Science and Engineering, vol. 3, pp. 877-884, 2011. S. Ganapathy, P. Yogesh, and A. Kannan, “Intelligent agent-based intrusion detection system using enhanced multiclass SVM,” Computational Intelligence and Neuroscience Journal, vol. 12, pp. 1-10, 2012. Y. Shoham, “An overview of agent-oriented programming,” in: J. M. Bradshaw. Menlo Park. (eds.) Software Agents, Calif, AAAI Press, 1997. Y.-Q. Fan, Y.-H. Wang, and W.-Q. Wang, “Adaptive fuzzy tracking control with compressor and limiters for u1ncertain nonlinear systems,” International Journal of Fuzzy Systems, vol. 16, no. 1, pp. 31-38, 2014. S. N. Shiaeles, V. Katos, A. S. Karakos, and B. K. Papadopoulos, “Real time DDoS detection using fuzzy estimators,” Computers & Security, vol. 31, no. 6, pp. 782-790, 2012. J. Mirkovic, A. Hussain, S. Fahmy, P. Reiher, and R. Thomas, “Accurately measuring denial of service in simulation and testbed experiments,” IEEE Trans. on Dependable and Secure Computing, vol. 6, no. 2, pp. 81-95, 2009. M. Sachdeva, K. Kumar, G. Singh, and K. Singh, “Performance analysis of web service under DDoS attacks,” IEEE International Advance Computing Conference (IACC 2009), Patiala, India, 2009. M. Sachdeva, G. Singh, K. Kumar, and K. Singh “Measuring impact of DDOS attacks on web services,” Journal of Information Assurance and Security, vol. 5, no. 4, pp. 392-400, 2010. B. Safaiezadeh, A. M. Rahmani, and E. Mahdipour, “A new fuzzy congestion control algorithm in computer networks,” IEEE International Conference on Future Computer and Communication, April 03-05, Kuala Lumpur, Malaysia, 2009, pp. 314-317. C. Siaterlis and B. Maglaris, “Towards multisensor data fusion for DoS detection,” in Proc. of the ACM symposium on Applied computing, 2004, pp. 439-446. B. S. K. Devi, G. Preetha, S. D. Nidhya, and S. M. Shalinie, “DDoS detection using host-network based metrics and mitigation in experimental testbed,” IEEE International Conference on Recent G. Preetha et al.: Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] Trends in Information Technology (ICRTIT), MIT, Anna University, Chennai, pp. 423-427, 2012. S. T. Zargar, “A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks,” IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2046-2069, 2013. M. H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya, and J. K. Kalita, “Detecting distributed denial of service attacks: Methods, tools and future directions,” The Computer Journal, vol. 57, no. 4, pp. 537-556, 2014. G. Loukas and G. Öke, “Protection against denial of service attacks: A survey,” Computer Journal, vol. 53, no. 7, pp. 1020-1037, 2010. C. V. Zhou, C. Leckie, and S. Karunasekera, “A survey of coordinated attacks and collaborative intrusion detection,” Computers & Security, vol. 29, no. 1, pp. 124-140, 2010. M. Callau, V. Gulisano, Z. Fu, R. Jimenez-Peris, M. Papatriantafilou, and M. Patino-Martinez, “Stone: A stream-based DDoS defense framework,” 28th Annual ACM Symposium on Applied Computing (SAC), March 18-22, Coimbra, Portugal, 2013. W. Dou, Q. Chen, and J. Chen, “A confidence based filtering method for DDoS attack defense in cloud environment,” Future Generation Computer Systems, vol. 29, pp. 1838-1850, 2013. S. Tripathi, B. Gupta, A. Almomani, A. Mishra, and S. Veluru, “Hadoop based defense solution to handle distributed denial of service (DDoS) attacks,” Journal of Information Security, vol. 4, pp. 150-164, 2013. J. C. Chou, B. Lin, S. Sen, and O. Spatscheck, “Proactive surge protection: A defense mechanism for bandwidth-based attacks,” IEEE/ACM Trans. on Networking, vol. 17, no. 6, pp. 1711-1723, 2009. Y. Gilad and A. Herzberg, “LOT: A defense against IP spoofing and flooding attacks,” ACM Trans. on Information and System Security, vol. 15, no. 2, 2012. S. Khanna, S. S. Venkatesh, O. Fatemieh, F. Khan, and C. A. Gunter, “Adaptive selective verification: An efficient adaptive countermeasure to thwart DoS attacks,” IEEE/ACM Trans. on Networking, vol. 20, no. 3, pp. 715-728, 2012. Z. Xia, S. Lu, and J. Li, “Enhancing DDoS flood attack detection via intelligent fuzzy logic,” Informatica, vol. 34, pp. 497-507, 2010. I. Kotenko and A. Ulanov, “Multi-agent framework for simulation of adaptive cooperative defense against internet attacks,” in International Workshop on Autonomous Intelligent Systems: Agents and Data Mining, LNCS, Springer, LNAI 4476, pp. 212-228, 2007. 527 [26] I. Kotenko, A. Konovalov, and A. Shorov, “Agent-based modeling and simulation of Botnets and Botnet Defence,” in C. Czosseck, K. Podins (eds.). in Proc. Conference on Cyber Conflict. CCD COE Publications, Tallinn, Estonia, pp. 21-44, 2010. [27] E. Herrero, M. Corchado, A. Pellicer, and A. Abraham, “Hybrid multi agent-neural network intrusion detection with mobile visualization,” Innovations in Hybrid Intelligent Systems, vol. 44, pp. 320-328, 2007. [28] S. Noh, C. Lee, K. Choi, and G. Jung, “Detecting distributed denial of service (DDoS) attacks through inductive learning,” Lecture Notes in Computer Science, IDEAL 2003, pp. 286-295, 2003. [29] F. W. Lanchester, “Mathematics in Warfare,” Simon & Schuster. (eds.) The World of Mathematics, vol. 4, pp. 2138-2157, 1956. [30] Y. Xiang and W. Zhou, “Safeguard information infrastructure against DDoS attacks: Experiments and modeling”, in proc. of CANS, pp. 320-333, 2005. [31] E. S. Adams and M. Mesterton-Gibbons, “Lanchester’s attrition models and fights among social animals,” International Society for Behavioral Ecology, vol. 14, pp. 719-723, 2003. [32] G. Preetha, B. S. K. Devi, and S. M. Shalinie “Combat model based DDoS detection and defence using experimental testbed: A quantitative approach,” International Journal of Intelligent Engineering Informatics, vol. 1, no. 3-4, pp. 261-279, 2011. [33] The Swiss Education and Research Network - Default TTL values in TCP/IP (2002) [Online]. Available: http://secfr.nerim.net/docs/fingerprint/ en/ttldefault.html. G. Preetha is currently pursing Ph.D. at Anna University. She received her MSIT in Information Technology in 2002 and M.phil in Computer Science from Madurai Kamaraj University in 2005. She worked as a Lecturer from 2002 to 2008. Her current research interests include network security and wireless adhoc networks. B. S. Kiruthika Devi is currently pursuing M.S (by Research) at Anna University. She received her BE in Electronics and Communication Engineering from Coimbatore Institute of Engineering and Information Technology in 2006. Her current research interests include network security and machine 528 International Journal of Fuzzy Systems, Vol. 16, No. 4, December 2014 learning. S. Mercy Shalinie is currently the Head of the Department of Computer Science and Engineering at Thiagarajar College of Engineering. She has published several papers in International Journals/Conferences. Her current areas of interest include machine learning, neural networks and information security.
© Copyright 2026 Paperzz