ABSTRACT
In Distributed Denial of Service(DDoS) attack, the attacker uses a remotely controlled botnet to attack the target server at the same time to prevent legitimate users from obtaining information services. Previous studies focused on the detection of DDoS attacks on offline datasets, but ignored the detection of specific DDoS types, and some reports showed that the number of DDoS hybrid attacks was increasing significantly. In this paper, we propose an elastic detection mechanism(EDM), which can economize the server’s idle computing power. The framework integrates a variety of pre-trained lightweight CNN detect models, which are suitable for online rapid detection of DDoS hybrid attacks. We focus on evaluating the response accuracy and the detection speed of the EDM. The experimental results show that the model can achieve excellent hybrid attack detection performance, and meet the actual requirements of real-time detection.
- Muhammad Aamir and Syed Mustafa Ali Zaidi. 2021. Clustering based semi-supervised machine learning for DDoS attack classification. Journal of King Saud University-Computer and Information Sciences 33, 4 (2021), 436–446.Google ScholarCross Ref
- Alibaba Cloud. 2021. DDoS offense-defense situation observation in 2020-2021.Google Scholar
- Roberto Doriguzzi-Corin, Stuart Millar, Sandra Scott-Hayward, Jesus Martinez-del Rincon, and Domenico Siracusa. 2020. LUCID: A practical, lightweight deep learning solution for DDoS attack detection. IEEE Transactions on Network and Service Management 17, 2 (2020), 876–889.Google ScholarDigital Library
- Thomer M Gil and Massimiliano Poletto. 2001. MULTOPS: A Data-Structure for Bandwidth Attack Detection.. In USENIX security symposium. 23–38.Google ScholarCross Ref
- Ahmad Javaid, Quamar Niyaz, Weiqing Sun, and Mansoor Alam. 2016. A deep learning approach for network intrusion detection system. In Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS). 21–26.Google ScholarDigital Library
- Zhu Jian-Qi, Fu Feng, Yin Ke-Xin, and Liu Yan-Heng. 2013. Dynamic entropy based DoS attack detection method. Computers & Electrical Engineering 39, 7 (2013), 2243–2251.Google ScholarDigital Library
- Deepak Kshirsagar and Sandeep Kumar. 2022. A feature reduction based reflected and exploited DDoS attacks detection system. Journal of Ambient Intelligence and Humanized Computing (2022), 1–13.Google Scholar
- Jelena Mirkovic and Peter Reiher. 2004. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review2 (2004), 39–53.Google Scholar
- Tencent NSFOCUS. 2022. Global DDoS threat report in 2021.Google Scholar
- Yi-Chi Wu, Huei-Ru Tseng, Wuu Yang, and Rong-Hong Jan. 2011. DDoS detection and traceback with decision tree and grey relational analysis. International Journal of Ad Hoc and Ubiquitous Computing 7, 2 (2011), 121–136.Google ScholarDigital Library
- Xiaoyong Yuan, Chuanhuang Li, and Xiaolin Li. 2017. DeepDefense: identifying DDoS attack via deep learning. In 2017 IEEE international conference on smart computing (SMARTCOMP). IEEE, 1–8.Google ScholarCross Ref
- Mohd Azahari Mohd Yusof, Fakariah Hani Mohd Ali, and Mohamad Yusof Darus. 2018. Detection and defense algorithms of different types of DDoS attacks using machine learning. In Computational Science and Technology: 4th ICCST 2017, Kuala Lumpur, Malaysia, 29–30 November, 2017. Springer, 370–379.Google ScholarCross Ref
Index Terms
- Elastic Detection Mechanism Aimed at Hybrid DDoS Attack
Recommendations
DDoS attack detection algorithms based on entropy computing
ICICS'07: Proceedings of the 9th international conference on Information and communications securityDistributed Denial of Service (DDoS) attack poses a severe threat to the Internet. It is difficult to find the exact signature of attacking. Moreover, it is hard to distinguish the difference of an unusual high volume of traffic which is caused by the ...
DDoS Attack Detection Algorithms Based on Entropy Computing
Information and Communications SecurityAbstractDistributed Denial of Service (DDoS) attack poses a severe threat to the Internet. It is difficult to find the exact signature of attacking. Moreover, it is hard to distinguish the difference of an unusual high volume of traffic which is caused by ...
Non-negative Increment Feature Detection of the Traffic Throughput for Early DDoS Attack
SITIS '07: Proceedings of the 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based SystemOne of the major threats to cyber security is Distributed Denial of Service (DDoS) attacks. In this paper, we reveal the non-negative and cumulative increment effect of DDoS traffic throughput that is the feature accurately distinguished DDoS attacking ...
Comments