Simulation of Rank Correlation Based Detection Mechanism for Distributed Denial of Services Attacks


  • G. Rama Rao
  • Avinash Konduri
  • Venkat Narayana Rao


Denial of Services, Distributed Reflection DoS (DRDoS), Rank Correlation based Detection, Distributed Denial of Services (DDoS).


Since the dawn of the Internet, DDoS exhibits a serious threat to the Internet, in which large number of controlled hosts floods the scapegoat or victim site with enormous packets. Furthermore, in Distributed Reflection DoS (DRDoS), invaders bluff or cheat innocent servers into flushing packets to the victim. However, most of current DRDoS detection mechanisms are associated with specific protocols and cannot be used for mysterious or unrecognized protocols. It is learnt that the stimulation by the same attacking flow, the responsive flows from reflectors may have inherent relations: the packet rate of one converged responsive flow may have linear relationships with another. Based on this investigation, the Rank Correlation based Detection (RCD) algorithm is proposed. The primary simulations denote that RCD can differentiate reflection flows from authorized and authenticated ones effectively and efficiently thus, can be utilized as a useable indicator for DRDoS. The paper presents a study of latest botnet attacks and proposes an appropriate guard method for DDoS attacks.


Wei Wei, Feng Chen, Yingjie Xia, and Guang Jin “A Rank Correlation Based Detection against Distributed Reflection DoS Attacks”, IEEE Communications Letters, Vol. 17, no. 1, January 2013.

Lei Zhang, Shui Yu, Di Wu and Paul Watters “A Survey on Latest Botnet Attack and Defense”, 2011 –International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11.

Vern Paxson, “An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks”, Computer Communication Review 31(3), July 2001.

“Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring”, Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao, In Proceedings of the Third International IFIP-TC6 Networking Conference(2002).

Yonghui Li, Yulong Wang, Fangchun Yang, Sen Su , “Traceback DRDoS Attacks”, Journal of Information & Computational Science 8: 1 (2011) 94–111

T. Hiroshi, O. Kohei, and Y. Atsunori, “Detecting DRDoS attacks by a simple response packet confirmation mechanism,” Computer Commun., vol. 31, no. 14, pp. 3299–3306, 2008.

T. Vogt, “Application-level reflection attacks.” Available:

S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang, “Discriminating DDoS attacks from flash crowds using flow correlation coefficient,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 1073–1080, 2012.




How to Cite

Rao, G. R., Konduri, A., & Rao, V. N. (2015). Simulation of Rank Correlation Based Detection Mechanism for Distributed Denial of Services Attacks. International Journal of Computer (IJC), 16(1), 1–8. Retrieved from