DDoSAttacksDetectionusingMachineLearningAlgorithmsQianLiCommunicationUniversityofChinaBeijing,Chinaliqian0716@cuc.
edu.
cnLinhaiMengCommunicationUniversityofChinaBeijing,Chinaxmenglinhai@outlook.
comJinyaoYanCommunicationUniversityofChinaBeijing,Chinajyan@cuc.
edu.
cnYuanZhangCommunicationUniversityofChinaBeijing,Chinayuanzhang@cuc.
edu.
cnABSTRACTAdistributeddenial-of-service(DDoS)attackisamaliciousattempttodisruptnormaltrafficofatargetedserver,serviceornetworkbyoverwhelmingthetargetoritssurroundinginfrastructurewithafloodofInternettraffic.
Ithascausedgreatharmtothesecurityofthenetworkenvironment.
ThispaperdevelopsanovelframeworkcalledPCA-RNN(PrincipalComponentAnalysis-RecurrentNeuralNetwork)toidentifyDDoSattacks.
Inordertocomprehensivelyunderstandthenetworktraffic,weselectmostnetworkcharacteristicstodescribethetraffic.
WefurtherusethePCAalgorithmtoreducethedimensionsofthefeaturesinordertoreducethetimecomplexityofdetection.
ByapplyingPCA,thepredictiontimecanbesignificantlyreducedwhilemostoftheoriginalinformationcanstillbecontained.
DataafterdimensionsreductionisfedintoRNNtotrainandgetdetectionmodel.
Evaluationresultshowsthatfortherealdataset,PCA-RNNcanachievesignificantperformanceimprovementintermsofaccuracy,sensitivity,precision,andF-scorecomparedtotheseveralexistingDDoSattacksdetectionmethods.
CCSCONCEPTSSecurityandprivacyNetworksecurityDenial-of-serviceattacksKEYWORDSDDoSattacks,RNN,PCA,trafficfeatures1MotivationsDDoSattackisdistributedinthewaythattheattackerisusingmultiplecomputerstolaunchthedenialofserviceattack.
AnewstudythattriestomeasurethedirectcostofthatoneDDoSattackforIoT(InternetofThings)deviceuserswhosemachinesweresweptupintheassaultfoundthatitmayhavecostdeviceownersatotalof$323,973.
75inexcesspowerandaddedbandwidthconsumption[1].
Itisurgenttodomorein-depthresearchonDDoSattacks,andDDoSattacksdetectionasaveryimportantparthasbecomeahottopicoftheresearcharea.
Currently,thereexistmanystatisticalDDoSdetectionmethods,suchasnetworktrafficstatisticsfeaturesbaseddetection,sourceIPanddestinationIPaddresses-baseddetection,portentropyvalues-baseddetection,andwavelet-basedanalysis[2,3],anddestinationentropy[4],etc.
However,withthedevelopmentofInternettechnology,theDDoSattackmodelischangingfasterandfaster.
Constructionofanewstatisticalmodelrequiresalotoftimetobuild,sothatitdoesnotadaptwelltotherapidlychangingnetworkenvironment.
Thestatisticalmodelhasasingleapplicationscenarioandalotofcomplexityofbuildingorupgradingthemodel.
Inordertosolvetheaboveproblems,thewayofDDoSattacksdetectionthroughmachinelearningalgorithmshasgraduallybecomethefocusofresearch.
Themachinelearningalgorithmcanfindouttheabnormalinformationbehindthemassivedata,whichiswidelylovedbyresearchers.
Theadvantageofthemachinelearningdetectionmodelisthatnewdatacanquicklyupdatethedetectionmodel.
Therearestillsomedeficiencies.
Duetothehighcomputationalcomplexityofmachinelearningalgorithms,itrequireslongerpredictiontime.
ThemachinelearningalgorithmsusedtodetectDDoSattacksdonotconsiderthetimecorrelationoftrafficdata.
Motivatedbythesechallenges,thispaperpresentsPrincipalComponentAnalysis-RecurrentNeuralNetwork(PCA-RNN)toidentifyDDoSattacks.
Wefirstextractallrelevantfeaturestoensureouralgorithmcancoveralltheattacktypes,whichimprovessingleapplicationscenarioproblem.
Thefeaturesincludesfouraspects,namely,floodfeature,slowattackfeature,flowtimefeatureandwebattackfeature.
Duetothelargenumberoffeaturesselectedinthefirststep,thecomputationalcomplexityofthedetectionalgorithmislargelyincreased.
Wehandlethisproblembyreducingthedimensionofinputfeatures.
WeusePCAasourdimension-reductionmethod,whichisanefficientandflexiblelineardimension-reductionmethod.
Finally,sincenetworktraffichasshorttimecorrelation,itisbeneficialifthedetectionalgorithmcouldincorporatetheshorttimefeaturesoftheinputdata.
Inthisway,weselectRNNalgorithmwhichhasshort-termmemoryandistimelyefficientasourtrainingmodule.
2MethodWedescribethedesigndetailsinthissection.
WefirstselectallrelevantfeaturestoensurethattheneuralnetworkcanthoroughlylearntheDDoSattacksinformation.
Toreducethetimecomplexity,weusePCAtoreducethefeaturevectordimensionsandsimplifytheneuralnetworkmodel.
ComparedwithLinearDiscriminantAnalysis(LDA)andotherlineardimensionalityreductionmethods,PCAismoreflexibletoselecttheoutputdimensionaccordingtoactualrequirements,sowechosePCAasthedimensionreductionmethod.
Finally,weconstructafront-to-backcorrelationofnetworkbyRNNalgorithmsothatDDoSdetectioncanbeperformedfrommultipleperspectives.
ThearchitectureoftheproposedframeworkisillustratedinFigure1.
APNet2018,August2-32018,Beijing,ChinaQianLietal.
Figure1:PCA-RNNModel3PreliminaryResultsWeevaluateouralgorithmandcomparewithseveralexistingdetectionalgorithmusingKDDdataset[5].
TheKDDdatasetisa9weeknetworkconnectiondatacollectedfromasimulatedUnitedStatesAirForceLAN,dividedintoidentifiedtrainingdataandnotidentifiedtestdata.
Thetestdataandthetrainingdatahaveadifferentprobabilitydistribution,andthetestdatacontainssometypesofattackthatdonotappearinthetrainingdata,whichmakestheintrusiondetectionmorerealistic.
Figure2:Performancemetrics.
Figure3:PredictiontimeofPCA-RNNcomparedwithexistingmethods.
AscanbeseeninFigure2andFigure3,thepredictiontimeofPCA-RNNcanbesignificantlydecreasedcomparingtheRNNalgorithmswithsimilaraccuracyrateandF1value.
TheaccuracyandF1ofPCA-BP,BPandPCA-LSTMalgorithmsarelowerthanPCA-RNN.
PCA-SVMpredictiontakes83.
3326sandtakestoolongtodraweasily.
WecanalsoseefromFigure3,PCA-RNNneedstheminimumpredictiontimeabovetheaccuracyof98.
7%.
Figure4.
DetectionaccuracyofPCA-RNNcomparedwithexistingmethods.
WealsocompareourPCA-RNNwithseveralexistingstatisticalalgorithms.
AscanbeseeninFigure4,statisticaldetectionalgorithmscanonlyperformwelloncertaintypesofattacks,whileourPCA-RNNalgorithmshowsgooddetectionaccuracyonalltestingscenarios.
4ConclusionandFutureWorkThispaperpresentsanovelmachinelearningbasedDDoSdetectionmethodwithbothaccuracyandefficiency.
Inthefuturework,wewilltestthealgorithmthroughmorerealdatasetandtrytostudytheinherentcharacteristicsundertheselectedfeatures.
REFERENCES[1]Study:AttackonKrebsOnSecurityCostIoTDeviceOwners$323K,Available:https://krebsonsecurity.
com/2018/05/study-attack-on-krebsonsecurity-cost-iot-device-owners-323k/[2]Tao,Y.
,&Yu,S.
(2013).
DDoSAttackDetectionatLocalAreaNetworksUsingInformationTheoreticalMetrics.
IEEEInternationalConferenceonTrust,SecurityandPrivacyinComputingandCommunications(Vol.
8,pp.
233-240).
IEEE.
[3]Dong,P.
,Du,X.
,Zhang,H.
,&Xu,T.
(2016).
AdetectionmethodforanovelDDoSattackagainstSDNcontrollersbyvastnewlow-trafficflows.
IEEEInternationalConferenceonCommunications(pp.
1-6).
IEEE.
[4]Mousavi,S.
M.
,&Sthilaire,M.
(2015).
EarlydetectionofDDoSattacksagainstSDNcontrollers.
InternationalConferenceonComputing,NETWORKINGandCommunications(Vol.
17,pp.
77-81).
IEEEComputerSociety.
[5]KDDCupData,http://kdd.
ics.
uci.
edu/databases/kddcup99/kddcup99.
html.
妮妮云的来历妮妮云是 789 陈总 张总 三方共同投资建立的网站 本着“良心 便宜 稳定”的初衷 为小白用户避免被坑妮妮云的市场定位妮妮云主要代理市场稳定速度的云服务器产品,避免新手购买云服务器的时候众多商家不知道如何选择,妮妮云就帮你选择好了产品,无需承担购买风险,不用担心出现被跑路 被诈骗的情况。妮妮云的售后保证妮妮云退款 通过于合作商的友好协商,云服务器提供2天内全额退款,超过2天不退款 物...
昨天我们很多小伙伴们应该都有看到,包括有隔壁的一些博主们都有发布Vultr商家新的新用户注册福利活动。以前是有赠送100美元有效期30天的,这次改成有效期14天。早年才开始的时候有效期是60天的,这个是商家行为,主要还是吸引到我们后续的充值使用,毕竟他们的体验金赠送,在同类商家中算是比较大方的。昨天活动内容:重新调整Vultr新注册用户赠送100美元奖励金有效期14天今天早上群里的朋友告诉我,两年...
企鹅小屋怎么样?企鹅小屋最近针对自己的美国cn2 gia套餐推出了2个优惠码:月付7折和年付6折,独享CPU,100%性能,三网回程CN2 GIA网络,100Mbps峰值带宽,用完优惠码1G内存套餐是年付240元,线路方面三网回程CN2 GIA。如果新购IP不能正常使用,请在开通时间60分钟内工单VPS技术部门更换正常IP;特价主机不支持退款。点击进入:企鹅小屋官网地址企鹅小屋优惠码:年付6折优惠...
ddos为你推荐
虚拟空间主机虚拟主机和空间有什么关系?国内域名注册请问中国可以注册一级域名的是哪几个网站?美国免费主机能介绍一个美国免费的ASP或PHP主机空间吗域名注册网注册域名上哪个网站最好vps虚拟主机虚拟主机和VPS该选择哪个比较好海外主机美国主机哪个好,最好是速度和稳定性能跟得上?免费国外空间那个国外空间好啊啊 价格便宜 急需成都虚拟空间成都有没有能玩ps主机游戏的网咖?网站空间租用公司网站租用什么样的网站空间合适100m虚拟主机100元虚拟主机
国内vps 免费cn域名 美国独立服务器 国外服务器 韩国加速器 wdcp 一元域名 商务主机 华为网络硬盘 最好的免费空间 泉州电信 东莞数据中心 美国网站服务器 国外视频网站有哪些 银盘服务 网页提速 全能空间 广州虚拟主机 免费网络 实惠 更多