skip to main content
10.1145/3590003.3590031acmotherconferencesArticle/Chapter ViewAbstractPublication PagescacmlConference Proceedingsconference-collections
research-article

Elastic Detection Mechanism Aimed at Hybrid DDoS Attack

Authors Info & Claims
Published:29 May 2023Publication History

ABSTRACT

In Distributed Denial of Service(DDoS) attack, the attacker uses a remotely controlled botnet to attack the target server at the same time to prevent legitimate users from obtaining information services. Previous studies focused on the detection of DDoS attacks on offline datasets, but ignored the detection of specific DDoS types, and some reports showed that the number of DDoS hybrid attacks was increasing significantly. In this paper, we propose an elastic detection mechanism(EDM), which can economize the server’s idle computing power. The framework integrates a variety of pre-trained lightweight CNN detect models, which are suitable for online rapid detection of DDoS hybrid attacks. We focus on evaluating the response accuracy and the detection speed of the EDM. The experimental results show that the model can achieve excellent hybrid attack detection performance, and meet the actual requirements of real-time detection.

References

  1. Muhammad Aamir and Syed Mustafa Ali Zaidi. 2021. Clustering based semi-supervised machine learning for DDoS attack classification. Journal of King Saud University-Computer and Information Sciences 33, 4 (2021), 436–446.Google ScholarGoogle ScholarCross RefCross Ref
  2. Alibaba Cloud. 2021. DDoS offense-defense situation observation in 2020-2021.Google ScholarGoogle Scholar
  3. Roberto Doriguzzi-Corin, Stuart Millar, Sandra Scott-Hayward, Jesus Martinez-del Rincon, and Domenico Siracusa. 2020. LUCID: A practical, lightweight deep learning solution for DDoS attack detection. IEEE Transactions on Network and Service Management 17, 2 (2020), 876–889.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Thomer M Gil and Massimiliano Poletto. 2001. MULTOPS: A Data-Structure for Bandwidth Attack Detection.. In USENIX security symposium. 23–38.Google ScholarGoogle ScholarCross RefCross Ref
  5. Ahmad Javaid, Quamar Niyaz, Weiqing Sun, and Mansoor Alam. 2016. A deep learning approach for network intrusion detection system. In Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS). 21–26.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Zhu Jian-Qi, Fu Feng, Yin Ke-Xin, and Liu Yan-Heng. 2013. Dynamic entropy based DoS attack detection method. Computers & Electrical Engineering 39, 7 (2013), 2243–2251.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Deepak Kshirsagar and Sandeep Kumar. 2022. A feature reduction based reflected and exploited DDoS attacks detection system. Journal of Ambient Intelligence and Humanized Computing (2022), 1–13.Google ScholarGoogle Scholar
  8. Jelena Mirkovic and Peter Reiher. 2004. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review2 (2004), 39–53.Google ScholarGoogle Scholar
  9. Tencent NSFOCUS. 2022. Global DDoS threat report in 2021.Google ScholarGoogle Scholar
  10. Yi-Chi Wu, Huei-Ru Tseng, Wuu Yang, and Rong-Hong Jan. 2011. DDoS detection and traceback with decision tree and grey relational analysis. International Journal of Ad Hoc and Ubiquitous Computing 7, 2 (2011), 121–136.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Xiaoyong Yuan, Chuanhuang Li, and Xiaolin Li. 2017. DeepDefense: identifying DDoS attack via deep learning. In 2017 IEEE international conference on smart computing (SMARTCOMP). IEEE, 1–8.Google ScholarGoogle ScholarCross RefCross Ref
  12. Mohd Azahari Mohd Yusof, Fakariah Hani Mohd Ali, and Mohamad Yusof Darus. 2018. Detection and defense algorithms of different types of DDoS attacks using machine learning. In Computational Science and Technology: 4th ICCST 2017, Kuala Lumpur, Malaysia, 29–30 November, 2017. Springer, 370–379.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Elastic Detection Mechanism Aimed at Hybrid DDoS Attack

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CACML '23: Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning
      March 2023
      598 pages
      ISBN:9781450399449
      DOI:10.1145/3590003

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 May 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      CACML '23 Paper Acceptance Rate93of241submissions,39%Overall Acceptance Rate93of241submissions,39%
    • Article Metrics

      • Downloads (Last 12 months)53
      • Downloads (Last 6 weeks)13

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format