DDoSAttacksDetectionusingMachineLearningAlgorithmsQianLiCommunicationUniversityofChinaBeijing,Chinaliqian0716@cuc.
edu.
cnLinhaiMengCommunicationUniversityofChinaBeijing,Chinaxmenglinhai@outlook.
comJinyaoYanCommunicationUniversityofChinaBeijing,Chinajyan@cuc.
edu.
cnYuanZhangCommunicationUniversityofChinaBeijing,Chinayuanzhang@cuc.
edu.
cnABSTRACTAdistributeddenial-of-service(DDoS)attackisamaliciousattempttodisruptnormaltrafficofatargetedserver,serviceornetworkbyoverwhelmingthetargetoritssurroundinginfrastructurewithafloodofInternettraffic.
Ithascausedgreatharmtothesecurityofthenetworkenvironment.
ThispaperdevelopsanovelframeworkcalledPCA-RNN(PrincipalComponentAnalysis-RecurrentNeuralNetwork)toidentifyDDoSattacks.
Inordertocomprehensivelyunderstandthenetworktraffic,weselectmostnetworkcharacteristicstodescribethetraffic.
WefurtherusethePCAalgorithmtoreducethedimensionsofthefeaturesinordertoreducethetimecomplexityofdetection.
ByapplyingPCA,thepredictiontimecanbesignificantlyreducedwhilemostoftheoriginalinformationcanstillbecontained.
DataafterdimensionsreductionisfedintoRNNtotrainandgetdetectionmodel.
Evaluationresultshowsthatfortherealdataset,PCA-RNNcanachievesignificantperformanceimprovementintermsofaccuracy,sensitivity,precision,andF-scorecomparedtotheseveralexistingDDoSattacksdetectionmethods.
CCSCONCEPTSSecurityandprivacyNetworksecurityDenial-of-serviceattacksKEYWORDSDDoSattacks,RNN,PCA,trafficfeatures1MotivationsDDoSattackisdistributedinthewaythattheattackerisusingmultiplecomputerstolaunchthedenialofserviceattack.
AnewstudythattriestomeasurethedirectcostofthatoneDDoSattackforIoT(InternetofThings)deviceuserswhosemachinesweresweptupintheassaultfoundthatitmayhavecostdeviceownersatotalof$323,973.
75inexcesspowerandaddedbandwidthconsumption[1].
Itisurgenttodomorein-depthresearchonDDoSattacks,andDDoSattacksdetectionasaveryimportantparthasbecomeahottopicoftheresearcharea.
Currently,thereexistmanystatisticalDDoSdetectionmethods,suchasnetworktrafficstatisticsfeaturesbaseddetection,sourceIPanddestinationIPaddresses-baseddetection,portentropyvalues-baseddetection,andwavelet-basedanalysis[2,3],anddestinationentropy[4],etc.
However,withthedevelopmentofInternettechnology,theDDoSattackmodelischangingfasterandfaster.
Constructionofanewstatisticalmodelrequiresalotoftimetobuild,sothatitdoesnotadaptwelltotherapidlychangingnetworkenvironment.
Thestatisticalmodelhasasingleapplicationscenarioandalotofcomplexityofbuildingorupgradingthemodel.
Inordertosolvetheaboveproblems,thewayofDDoSattacksdetectionthroughmachinelearningalgorithmshasgraduallybecomethefocusofresearch.
Themachinelearningalgorithmcanfindouttheabnormalinformationbehindthemassivedata,whichiswidelylovedbyresearchers.
Theadvantageofthemachinelearningdetectionmodelisthatnewdatacanquicklyupdatethedetectionmodel.
Therearestillsomedeficiencies.
Duetothehighcomputationalcomplexityofmachinelearningalgorithms,itrequireslongerpredictiontime.
ThemachinelearningalgorithmsusedtodetectDDoSattacksdonotconsiderthetimecorrelationoftrafficdata.
Motivatedbythesechallenges,thispaperpresentsPrincipalComponentAnalysis-RecurrentNeuralNetwork(PCA-RNN)toidentifyDDoSattacks.
Wefirstextractallrelevantfeaturestoensureouralgorithmcancoveralltheattacktypes,whichimprovessingleapplicationscenarioproblem.
Thefeaturesincludesfouraspects,namely,floodfeature,slowattackfeature,flowtimefeatureandwebattackfeature.
Duetothelargenumberoffeaturesselectedinthefirststep,thecomputationalcomplexityofthedetectionalgorithmislargelyincreased.
Wehandlethisproblembyreducingthedimensionofinputfeatures.
WeusePCAasourdimension-reductionmethod,whichisanefficientandflexiblelineardimension-reductionmethod.
Finally,sincenetworktraffichasshorttimecorrelation,itisbeneficialifthedetectionalgorithmcouldincorporatetheshorttimefeaturesoftheinputdata.
Inthisway,weselectRNNalgorithmwhichhasshort-termmemoryandistimelyefficientasourtrainingmodule.
2MethodWedescribethedesigndetailsinthissection.
WefirstselectallrelevantfeaturestoensurethattheneuralnetworkcanthoroughlylearntheDDoSattacksinformation.
Toreducethetimecomplexity,weusePCAtoreducethefeaturevectordimensionsandsimplifytheneuralnetworkmodel.
ComparedwithLinearDiscriminantAnalysis(LDA)andotherlineardimensionalityreductionmethods,PCAismoreflexibletoselecttheoutputdimensionaccordingtoactualrequirements,sowechosePCAasthedimensionreductionmethod.
Finally,weconstructafront-to-backcorrelationofnetworkbyRNNalgorithmsothatDDoSdetectioncanbeperformedfrommultipleperspectives.
ThearchitectureoftheproposedframeworkisillustratedinFigure1.
APNet2018,August2-32018,Beijing,ChinaQianLietal.
Figure1:PCA-RNNModel3PreliminaryResultsWeevaluateouralgorithmandcomparewithseveralexistingdetectionalgorithmusingKDDdataset[5].
TheKDDdatasetisa9weeknetworkconnectiondatacollectedfromasimulatedUnitedStatesAirForceLAN,dividedintoidentifiedtrainingdataandnotidentifiedtestdata.
Thetestdataandthetrainingdatahaveadifferentprobabilitydistribution,andthetestdatacontainssometypesofattackthatdonotappearinthetrainingdata,whichmakestheintrusiondetectionmorerealistic.
Figure2:Performancemetrics.
Figure3:PredictiontimeofPCA-RNNcomparedwithexistingmethods.
AscanbeseeninFigure2andFigure3,thepredictiontimeofPCA-RNNcanbesignificantlydecreasedcomparingtheRNNalgorithmswithsimilaraccuracyrateandF1value.
TheaccuracyandF1ofPCA-BP,BPandPCA-LSTMalgorithmsarelowerthanPCA-RNN.
PCA-SVMpredictiontakes83.
3326sandtakestoolongtodraweasily.
WecanalsoseefromFigure3,PCA-RNNneedstheminimumpredictiontimeabovetheaccuracyof98.
7%.
Figure4.
DetectionaccuracyofPCA-RNNcomparedwithexistingmethods.
WealsocompareourPCA-RNNwithseveralexistingstatisticalalgorithms.
AscanbeseeninFigure4,statisticaldetectionalgorithmscanonlyperformwelloncertaintypesofattacks,whileourPCA-RNNalgorithmshowsgooddetectionaccuracyonalltestingscenarios.
4ConclusionandFutureWorkThispaperpresentsanovelmachinelearningbasedDDoSdetectionmethodwithbothaccuracyandefficiency.
Inthefuturework,wewilltestthealgorithmthroughmorerealdatasetandtrytostudytheinherentcharacteristicsundertheselectedfeatures.
REFERENCES[1]Study:AttackonKrebsOnSecurityCostIoTDeviceOwners$323K,Available:https://krebsonsecurity.
com/2018/05/study-attack-on-krebsonsecurity-cost-iot-device-owners-323k/[2]Tao,Y.
,&Yu,S.
(2013).
DDoSAttackDetectionatLocalAreaNetworksUsingInformationTheoreticalMetrics.
IEEEInternationalConferenceonTrust,SecurityandPrivacyinComputingandCommunications(Vol.
8,pp.
233-240).
IEEE.
[3]Dong,P.
,Du,X.
,Zhang,H.
,&Xu,T.
(2016).
AdetectionmethodforanovelDDoSattackagainstSDNcontrollersbyvastnewlow-trafficflows.
IEEEInternationalConferenceonCommunications(pp.
1-6).
IEEE.
[4]Mousavi,S.
M.
,&Sthilaire,M.
(2015).
EarlydetectionofDDoSattacksagainstSDNcontrollers.
InternationalConferenceonComputing,NETWORKINGandCommunications(Vol.
17,pp.
77-81).
IEEEComputerSociety.
[5]KDDCupData,http://kdd.
ics.
uci.
edu/databases/kddcup99/kddcup99.
html.
zji怎么样?zji是一家老牌国人主机商家,公司开办在香港,这个平台主要销售独立服务器业务,和hostkvm是同一样,两个平台销售的产品类别不一平,商家的技术非常不错,机器非常稳定。昨天收到商家的优惠推送,目前针对香港邦联四型推出了65折优惠BGP线路服务器,性价比非常不错,有需要香港独立服务器的朋友可以入手,非常适合做站。zji优惠码:月付/年付优惠码:zji 物理服务器/VDS/虚拟主机空间订...
Bluehost怎么样,Bluehost好不好,Bluehost成立十八周年全场虚拟主机优惠促销活动开始,购买12个月赠送主流域名和SSL证书,Bluehost是老牌虚拟主机商家了,有需要虚拟主机的朋友赶紧入手吧,活动时间:美国MST时间7月6日中午12:00到8月13日晚上11:59。Bluehost成立于2003年,主营WordPress托管、虚拟主机、VPS主机、专用服务器业务。Blueho...
DiyVM 香港沙田机房,也是采用的CN2优化线路,目前也有入手且在使用中,我个人感觉如果中文业务需要用到的话虽然日本机房也是CN2,但是线路的稳定性不如香港机房,所以我们在这篇文章中亲测看看香港机房,然后对比之前看到的日本机房。香港机房的配置信息。CPU内存 硬盘带宽IP价格购买地址2核2G50G2M1¥50/月选择方案4核4G60G3M1¥100/月选择方案4核8G70G3M4¥200/月选择...
ddos为你推荐
租服务器租个一般的服务器大概多少钱啊?空间域名服务器和空间域名什么意思台湾vps做一个论坛,请问需要什么样的vps配置下载虚拟主机怎么安装虚拟机淘宝虚拟主机淘宝买虚拟主机空间好吗?深圳虚拟主机深圳有哪些比较有名气的网络推广公司虚拟主机测评我们可以用哪些命令来测试一个虚拟主机的好坏?域名网站域名和网址一样吗?老域名买老域名好还是新域名好呢?老域名收录会不好吗?老域名求问老域名好吗
短域名 cn域名价格 站群服务器 美国php主机 建站代码 panel1 骨干网络 me空间社区 七夕快乐英语 google台湾 空间登陆首页 主机返佣 九零网络 winserver2008 server2008 nic 最好的空间日志 8度空间论坛 web服务器安全配置 英国伦敦28小时内4人被杀 更多