skip to main content
10.1145/3383845.3383871acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccmbConference Proceedingsconference-collections
research-article

Detecting Linking Flooding Attacks using Deep Convolution Network

Published: 05 April 2020 Publication History

Abstract

With the development of technology, a new kind of Distributed Denial-of-Service (DDoS) attack named link-flooding attack (LFA) has been widely applied to congest critical network links and to paralyze the network service. This is mainly due to LFA is easily implemented, obfuscated, and occulted by launching large-scale legitimate low-speed flows to paralyze target network areas. Many solutions are proposed to detect LFA, they are designed by hand-crafted algorithms and hardly keep up the developing progress of self-organizing network structures and emerging network protocols. This study proposes a Deep-Learning based LFA defense framework, called DCN (Deep Convolution Network), that applies Convolution Neural Networks to statistically monitoring the network status through end-to-end functionality (Input: network status snapshot; Output: LFA attack or not attack) without any manual intervention. The experiment results demonstrate DCN can accurately detect DCN in varying network structure and flow patterns. Furthermore, DCN also provides quantitative security risk analysis by using learning time as the control variable, network structure as the independent variable, and time to identify LFA as the dependent variable. The contributions of DCN are (1) providing an autonomic LFA defense framework without any manual intervention, (2) providing objective and quantitative analytical security risk evaluating indicator, and (3) allowing cloud computing and Internet of Things company focuses on their service and leaves security defending to DCN.

References

[1]
Christos Liaskos, Sotiris Ioannidis, "Network Topology Effects on the Detectability of Crossfire Attacks", IEEE Transactions on Information Forensics and Security, vol. 13, issue. 17, 2018, pp. 1682--1695
[2]
Tunisha Varshney, Karan Verma, "Rectifying flow of duplicacy using Bloom-filter", International Conference on Computer, Communications and Electronics (Comptelix), 2017, pp.300--304
[3]
Lei Xue, Xiaobo Ma, Xiapu Luo, Edmond W. W. Chan, Tony T. N. Miu, Guofei Gu, "LinkScope: Toward Detecting Target Link Flooding Attacks", IEEE Transactions on Information Forensics and Security, vol. 13, issue 10, 2018, pp. 2423--2438
[4]
Afroze Ansari, Mohammed Abdul Waheed, "Flooding attack detection and prevention in MANET based on cross layer link quality assessment," International Conference on Intelligent Computing and Control Systems (ICICCS), 2017, pp. 612--617.
[5]
Kei Sakuma, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase, "Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination", Asia-Pacific Conference on Communications (APCC), 2017, pp. 1--6.
[6]
Juan Wang, Ru Wen, Jiangqi Li, Fei Yan, Bo Zhao, Fajiang Yu," Detecting and Mitigating Target Link-Flooding Attacks Using SDN", IEEE Transactions on Dependable and Secure Computing, 2018, pp. 1--1
[7]
Jing Zheng, Qi Li, Guofei Gu, Jiahao Cao, David K. Y. Yau, Jianping Wu, "Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis", IEEE Transactions on Information Forensics and Security, vol. 13, issue 7, pp. 1838--1853
[8]
Akshay A Nayak, N.K Sridhar, G R Poornima, Shivashankar, "Ways for protection against various attacks in the Internet", IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2017, pp.24--28

Cited By

View all
  • (2023)Deep learning for SDN-enabled campus networks: proposed solutions, challenges and future directionsInternational Journal of Intelligent Computing and Cybernetics10.1108/IJICC-12-2022-031216:4(697-726)Online publication date: 30-Mar-2023
  • (2022)RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing AlgorithmIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.311808119:6(4052-4067)Online publication date: 1-Nov-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCMB '20: Proceedings of the 2020 the 3rd International Conference on Computers in Management and Business
January 2020
303 pages
ISBN:9781450376778
DOI:10.1145/3383845
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Univ. of Manchester: University of Manchester
  • The Hong Kong Polytechnic: The Hong Kong Polytechnic University

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 April 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DDoS
  2. Deep Learning
  3. LFA
  4. SDN

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

ICCMB 2020

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Deep learning for SDN-enabled campus networks: proposed solutions, challenges and future directionsInternational Journal of Intelligent Computing and Cybernetics10.1108/IJICC-12-2022-031216:4(697-726)Online publication date: 30-Mar-2023
  • (2022)RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing AlgorithmIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.311808119:6(4052-4067)Online publication date: 1-Nov-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media