skip to main content
10.1145/3383845.3383871acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccmbConference Proceedingsconference-collections
research-article

Detecting Linking Flooding Attacks using Deep Convolution Network

Authors Info & Claims
Published:05 April 2020Publication History

ABSTRACT

With the development of technology, a new kind of Distributed Denial-of-Service (DDoS) attack named link-flooding attack (LFA) has been widely applied to congest critical network links and to paralyze the network service. This is mainly due to LFA is easily implemented, obfuscated, and occulted by launching large-scale legitimate low-speed flows to paralyze target network areas. Many solutions are proposed to detect LFA, they are designed by hand-crafted algorithms and hardly keep up the developing progress of self-organizing network structures and emerging network protocols. This study proposes a Deep-Learning based LFA defense framework, called DCN (Deep Convolution Network), that applies Convolution Neural Networks to statistically monitoring the network status through end-to-end functionality (Input: network status snapshot; Output: LFA attack or not attack) without any manual intervention. The experiment results demonstrate DCN can accurately detect DCN in varying network structure and flow patterns. Furthermore, DCN also provides quantitative security risk analysis by using learning time as the control variable, network structure as the independent variable, and time to identify LFA as the dependent variable. The contributions of DCN are (1) providing an autonomic LFA defense framework without any manual intervention, (2) providing objective and quantitative analytical security risk evaluating indicator, and (3) allowing cloud computing and Internet of Things company focuses on their service and leaves security defending to DCN.

References

  1. Christos Liaskos, Sotiris Ioannidis, "Network Topology Effects on the Detectability of Crossfire Attacks", IEEE Transactions on Information Forensics and Security, vol. 13, issue. 17, 2018, pp. 1682--1695Google ScholarGoogle ScholarCross RefCross Ref
  2. Tunisha Varshney, Karan Verma, "Rectifying flow of duplicacy using Bloom-filter", International Conference on Computer, Communications and Electronics (Comptelix), 2017, pp.300--304Google ScholarGoogle Scholar
  3. Lei Xue, Xiaobo Ma, Xiapu Luo, Edmond W. W. Chan, Tony T. N. Miu, Guofei Gu, "LinkScope: Toward Detecting Target Link Flooding Attacks", IEEE Transactions on Information Forensics and Security, vol. 13, issue 10, 2018, pp. 2423--2438Google ScholarGoogle ScholarCross RefCross Ref
  4. Afroze Ansari, Mohammed Abdul Waheed, "Flooding attack detection and prevention in MANET based on cross layer link quality assessment," International Conference on Intelligent Computing and Control Systems (ICICCS), 2017, pp. 612--617.Google ScholarGoogle Scholar
  5. Kei Sakuma, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase, "Traceroute-based target link flooding attack detection scheme by analyzing hop count to the destination", Asia-Pacific Conference on Communications (APCC), 2017, pp. 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  6. Juan Wang, Ru Wen, Jiangqi Li, Fei Yan, Bo Zhao, Fajiang Yu," Detecting and Mitigating Target Link-Flooding Attacks Using SDN", IEEE Transactions on Dependable and Secure Computing, 2018, pp. 1--1Google ScholarGoogle Scholar
  7. Jing Zheng, Qi Li, Guofei Gu, Jiahao Cao, David K. Y. Yau, Jianping Wu, "Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis", IEEE Transactions on Information Forensics and Security, vol. 13, issue 7, pp. 1838--1853Google ScholarGoogle ScholarCross RefCross Ref
  8. Akshay A Nayak, N.K Sridhar, G R Poornima, Shivashankar, "Ways for protection against various attacks in the Internet", IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2017, pp.24--28Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Detecting Linking Flooding Attacks using Deep Convolution Network

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCMB '20: Proceedings of the 2020 the 3rd International Conference on Computers in Management and Business
      January 2020
      303 pages
      ISBN:9781450376778
      DOI:10.1145/3383845

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 April 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader