Abstract
Distributed Denial-of-Service (DDoS) attacks disrupts the availability of essential services, which are one of the most harmful threats in today’s Internet. Many DDoS detection algorithms based on machine learning technology have emerged in recent years, for example, the LUCID algorithm, GNN model. But considering that DDoS attacks are based on both time and space, these algorithms only considered time and ignored space. Besides, by piece network traffic data is often difficult to obtain. The model we used in this paper is based on the Spatio-Temporal Graph Convolutional Network (STGCN) proposed by Yu B. et al. And on this basis, the model is improved for the unique characteristics of DDoS attacks. By considering the time-dependence of the network topology and network traffic, this model has a good recognition rate on the online DDoS data set, and can achieve detection of DDoS attacks under the premise of using only two-way traffic information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Doriguzzi-Corin, R., Millar, S., Scott-Hayward, S., Martinez-del-Rincon, J., Siracusa, D.: LUCID: a practical, lightweight deep learning solution for DDoS attack detection. arXiv preprint, arXiv:2002.04902v1 (2020)
Yu, B., Yin, H., Zhu, Z. Spatio-temporal graph convolutional networks: a deep learning framework for traffic forecasting. arXiv preprint, arXiv:1709.04875 (2017)
ISCX2012,” Intrusion detection evaluation dataset 2012” https://www.unb.ca/cic/datasets/ids.html. Accessed 15 May 2020
Cisco, VNI.: Cisco visual networking index: forecast and methodology 2016–2021. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/completewhite-paper-c11-481360.pdf (2017)
Zhou, J., Xu, Z., Rush, A.M., Yu, M.: Automating botnet detection with graph neural networks. arXiv preprint, arXiv: arXiv:2003.06344 (2020)
Segura, G.A.N., Skaperas, S., Chorti, A., Mamatas, L., Margi, C.B.: Denial of service attacks detection in software-defined wireless sensor networks. arXiv preprint, arXiv: arXiv:2003.12027 (2020)
Yuan, X., Li, C., Li, X.: DeepDefense: identifying DDoS attack via deep learning. In: Proceedings of SMARTCOMP (2017)
Min, E., Long, J., Liu, Q., Cui, J., W.: Chen, TR-IDS: anomalybased intrusion detection through text-convolutional neural network and random forest. Security and Communication Networks (2018)
Warraich, S.H., Aziz, Z., Khurshid, H., Hameed, R.A., Awais, S.M.: SDN enabled and OpenFlow compatible network performance monitoring system. arXiv preprint, arXiv: arXiv:2005.07765 (2020)
Radware, “Memcached DDoS Attacks.” https://security.radware.com/ddos-threats-attacks/threat-advisories-attack-reports/memcached-under-attack. Accessed 15 May 2020
Jaiswal, R., Bajgude, S.: Botnet technology. In: 3rd International Conference on Emerging Trends in Computer and Image Processing (ICETCIP 2013), pp. 169–175. (2013)
Perdisci, R., Lee, W., Feamster, N.: Behavioral clustering of http-based malware and signature generation using malicious network traces. In: Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI 2010, pp. 26, Berkeley, CA, USA (2010)
Acknowledgments
This study is supported by supported by The National Key Research and Development Program of China under grant 2017YFB0802704 and 2017YFB0802202.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Xie, Q., Huang, Z., Guo, J., Qiu, W. (2020). Spatio-Temporal Graph Convolutional Networks for DDoS Attack Detecting. In: Chen, X., Yan, H., Yan, Q., Zhang, X. (eds) Machine Learning for Cyber Security. ML4CS 2020. Lecture Notes in Computer Science(), vol 12486. Springer, Cham. https://doi.org/10.1007/978-3-030-62223-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-62223-7_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62222-0
Online ISBN: 978-3-030-62223-7
eBook Packages: Computer ScienceComputer Science (R0)