SPADE: Statistical packet acceptance defense engine

Shimrit Tzur-David*, Harel Avissar, Danny Dolev, Tal Anker

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A security engine should detect network traffic attacks at line-speed. "Learning" capabilities can help detecting new and unknown threats even before a vulnerability is exploited. The principal way for achieving this goal is to model anticipated network traffic behavior, and to use this model for identifying anomalies. This paper focuses on denial of service (DoS) attacks and distributed DoS (DDoS). Our goal is detecting and preventing of attacks. The main challenges include minimizing the false-positive rate and the memory consumption. SPADE: a Statistical Packet Acceptance Defense Engine is presented. SPADE is an accurate engine that uses an hierarchical adaptive structure to detect suspicious traffic using a relatively small memory footprint, therefore can be easily applied on hardware. SPADE is based on the assumption that during DoS/DDoS attacks, a significant portion of the traffic that is seen belongs to the attack, therefore, SPADE applies a statistical mechanism to primarily filter the attack's traffic.

Original languageEnglish
Title of host publication2010 International Conference on High Performance Switching and Routing, HPSR 2010
Pages119-126
Number of pages8
DOIs
StatePublished - 2010
Event2010 International Conference on High Performance Switching and Routing, HPSR 2010 - Richardson, TX, United States
Duration: 13 Jun 201016 Jun 2010

Publication series

Name2010 International Conference on High Performance Switching and Routing, HPSR 2010

Conference

Conference2010 International Conference on High Performance Switching and Routing, HPSR 2010
Country/TerritoryUnited States
CityRichardson, TX
Period13/06/1016/06/10

Fingerprint

Dive into the research topics of 'SPADE: Statistical packet acceptance defense engine'. Together they form a unique fingerprint.

Cite this