Scale matters: a Comparative Study of ...
Document type :
Autre communication scientifique (congrès sans actes - poster - séminaire...): Communication dans un congrès avec actes
Title :
Scale matters: a Comparative Study of Datasets for DDoS Attack Detection in CSP Infrastructure
Author(s) :
Boin, Clément [Auteur]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
OVHcloud [Roubaix]
Groléat, Tristan [Auteur]
OVHcloud [Roubaix]
Guillaume, Xavier [Auteur]
OVHcloud [Roubaix]
Grimaud, Gilles [Auteur]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Hauspie, Michaël [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Extra Small Extra Safe [2XS]
Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
OVHcloud [Roubaix]
Groléat, Tristan [Auteur]
OVHcloud [Roubaix]
Guillaume, Xavier [Auteur]
OVHcloud [Roubaix]
Grimaud, Gilles [Auteur]

Extra Small Extra Safe [2XS]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Hauspie, Michaël [Auteur]

Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Extra Small Extra Safe [2XS]
Conference title :
CloudNet2023
City :
New York
Country :
Etats-Unis d'Amérique
Start date of the conference :
2023-11-01
English keyword(s) :
DDoS Cloud Datasets Hyperscalers
DDoS
Cloud
Datasets
Hyperscalers
DDoS
Cloud
Datasets
Hyperscalers
HAL domain(s) :
Informatique [cs]
English abstract : [en]
Denial of Service (DoS) and Distributed Denial of Service (DDoS) are attacks designed to take down a service by exhausting its resources. Lots of research have been carried in the past decades to design efficient algorithms ...
Show more >Denial of Service (DoS) and Distributed Denial of Service (DDoS) are attacks designed to take down a service by exhausting its resources. Lots of research have been carried in the past decades to design efficient algorithms that can detect these attacks. However, most of the literature on DoS and DDoS detection consider the protection of a small or medium size businesses network. Usually, these networks consist in several workstations and servers protected by few firewalls that can analyze all incoming network traffic. So that the research on DoS and DDoS can be reproduced and analyzed, several datasets, reflecting this network infrastructures have been proposed in the literature. However, more and more businesses are migrating their services to the cloud and are renting servers from Cloud Service Providers (CSP). If the CSP wants to protect its customers from DoS and DDoS attacks, it must perform detection on its infrastructure. This kind of infrastructure is in no way comparable to the ones usually found in the literature. In this paper, we propose to compare publicly available state-of-the-art datasets with real network traffic captured on the infrastructure of a world-scale CSP and discuss their relevance in the context of detecting volumetric DDoS attacks on CSP infrastructure.Show less >
Show more >Denial of Service (DoS) and Distributed Denial of Service (DDoS) are attacks designed to take down a service by exhausting its resources. Lots of research have been carried in the past decades to design efficient algorithms that can detect these attacks. However, most of the literature on DoS and DDoS detection consider the protection of a small or medium size businesses network. Usually, these networks consist in several workstations and servers protected by few firewalls that can analyze all incoming network traffic. So that the research on DoS and DDoS can be reproduced and analyzed, several datasets, reflecting this network infrastructures have been proposed in the literature. However, more and more businesses are migrating their services to the cloud and are renting servers from Cloud Service Providers (CSP). If the CSP wants to protect its customers from DoS and DDoS attacks, it must perform detection on its infrastructure. This kind of infrastructure is in no way comparable to the ones usually found in the literature. In this paper, we propose to compare publicly available state-of-the-art datasets with real network traffic captured on the infrastructure of a world-scale CSP and discuss their relevance in the context of detecting volumetric DDoS attacks on CSP infrastructure.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Internationale
Popular science :
Non
Collections :
Source :
Files
- document
- Open access
- Access the document
- BoinC-0%20final.pdf
- Open access
- Access the document