AIセキュリティポータル K Program
A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection
Share
Abstract
Distributed Denial of Service (DDoS) attacks are getting increasingly harmful to the Internet, showing no signs of slowing down. Developing an accurate detection mechanism to thwart DDoS attacks is still a big challenge due to the rich variety of these attacks and the emergence of new attack vectors. In this paper, we propose a new tree-based DDoS detection approach that operates on a flow as a stream structure, rather than the traditional fixed-size record structure containing aggregated flow statistics. Although aggregated flow records have gained popularity over the past decade, providing an effective means for flow-based intrusion detection by inspecting only a fraction of the total traffic volume, they are inherently constrained. Their detection precision is limited not only by the lack of packet payloads, but also by their structure, which is unable to model fine-grained inter-packet relations, such as packet order and temporal relations. Additionally, inferring aggregated flow statistics must wait for the complete flow to end. Here we show that considering flow inputs as variable-length streams composed of their associated packet headers, allows for very accurate and fast detection of malicious flows. We evaluate our proposed strategy on the CICDDoS2019 and CICIDS2017 datasets, which contain a comprehensive variety of DDoS attacks. Our approach matches or exceeds existing machine learning techniques' accuracy, including state-of-the-art deep learning methods. Furthermore, our method achieves significantly earlier detection, e.g., with CICDDoS2019 detection based on the first 2 packets, which corresponds to an average time-saving of 99.79% and uses only 4--6% of the traffic volume.
Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges
R. Roman, J. Lopez, M. Mambo
Published: 2018
10 years of IoT malware: A feature-based taxonomy
B. Vignau, R. Khoury, S. Halle
Published: 2019
Security in mobile edge caching with reinforcement learning
L. Xiao, X. Wan, C. Dai, X. Du, X. Chen, M. Guizani
Published: 2018
Understanding the mirai botnet
M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis
Published: 2017
A survey of DDOS attacks using machine learning techniques
M. Arshi, M. Nasreen, K. Madhavi
Published: 2020
A survey of machine and deep learning methods for internet of things (IoT) security
Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Khalid Al-Ali, Xiaojiang Du, Ihsan Ali, Mohsen Guizani
Published: 2020
Deep learning approaches for detecting DDoS attacks: a systematic review
M. Mittal, K. Kumar, S. Behal
Published: 2022
Snort - lightweight intrusion detection for networks
M. Roesch
Published: 1999
Characterizing the effectiveness of network-based intrusion detection systems
E. Ficke, K. M. Schweitzer, R. M. Bateman, S. Xu
Published: 2018
Flow-based intrusion detection: Techniques and challenges
M. F. Umer, M. Sher, Y. Bi
Published: 2017
An overview of IP flow-based intrusion detection
A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, B. Stiller
Published: 2010
Flow-based intrusion detection
A. Sperotto, A. Pras
Published: 2011
Flow-based IDS for ICMPv6-based DDoS attacks detection
O. E. Elejla, M. Anbar, B. Belaton, B. O. Alijla
Published: 2018
Slow denial-of-service attacks on software defined networks
T. A. Pascoal, I. E. Fonseca, V. Nigam
Published: 2020
Deep learning: the frontier for distributed attack detection in fog-to-things computing
A. Abeshu, N. Chilamkurti
Published: 2018
Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy
I. Sharafaldin, A. H. Lashkari, S. Hakak, A. A. Ghorbani
Published: 2019
Towards effective detection of recent DDoS attacks: A deep learning approach
I. Ortet Lopes, D. Zou, F. A. Ruambo, S. Akbar, B. Yuan
Published: 2021
Ddosnet: A deep-learning model for detecting network attacks
M. S. Elsayed, N.-A. Le-Khac, S. Dev, A. D. Jurcut
Published: 2020
RTVD: A real-time volumetric detection scheme for DDoS in the internet of things
J. Li, M. Liu, Z. Xue, X. Fan, X. He
Published: 2020
Long short-term memory and fuzzy logic for anomaly detection and mitigation in software-defined network environment
M. P. Novaes, L. F. Carvalho, J. Lloret, M. L. Proenca
Published: 2020
Flowguard: an intelligent edge defense mechanism against IoT DDoS attacks
Y. Jia, F. Zhong, A. Alrawais, B. Gong, X. Cheng
Published: 2020
Towards effective network intrusion detection: from concept to creation on azure cloud
S. Rajagopal, P. P. Kundapur, K. Hareesha
Published: 2021
DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network
M. Almiani, A. AbuGhazleh, Y. Jararweh, A. Razaque
Published: 2021
Near real-time security system applied to sdn environments in iot networks using convolutional neural network
M. V. de Assis, L. F. Carvalho, J. J. Rodrigues, J. Lloret, M. L. Proenc¸a Jr
Published: 2020
Deep learning models for cyber security in IoT networks
M. Roopak, G. Y. Tian, J. Chambers
Published: 2019
LUCID: A practical, lightweight deep learning solution for DDoS attack detection
R. Doriguzzi-Corin, S. Millar, S. Scott-Hayward, J. Martinez-del Rincon, D. Siracusa
Published: 2020
An intrusion detection system based on deep belief networks
O. Belarbi, A. Khan, P. Carnelli, T. Spyridopoulos
Published: 2022
Statistical approaches to DDoS attack detection and response
L. Feinstein, D. Schnackenberg, R. Balupari, D. Kindred
Published: 2003
A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method
P. Bojovic, I. Ba ´ siˇ cevi ˇ c, S. Ocovaj, M. Popovi ´ c
Published: 2019
Detection of DDoS attacks using enhanced support vector machines with real time generated dataset
T. Subbulakshmi, K. BalaKrishnan, S. M. Shalinie, D. AnandKumar, V. GanapathiSubramanian, K. Kannathal
Published: 2011
Minds-minnesota intrusion detection system
L. Ertoz, E. Eilertson, A. Lazarevic, P.-N. Tan, V. Kumar, J. Srivastava, P. Dokas
Published: 2004
Frequent episode rules for intrusive anomaly detection with internet datamining
M. Qin, K. Hwang
Published: 2004
Detection of dns ddos attacks with random forest algorithm on spark
L. Chen, Y. Zhang, Q. Zhao, G. Geng, Z. Yan
Published: 2018
Xgboost classifier for ddos attack detection and analysis in sdn-based cloud
Z. Chen, F. Jiang, Y. Cheng, X. Gu, W. Liu, J. Peng
Published: 2018
Toward generating a new intrusion detection dataset and intrusion traffic characterization
Iman Sharafaldin, Arash Habibi Lashkari, Ali A Ghorbani
Published: 2018
Analysis of the 1999 DARPA/Lincoln laboratory IDS evaluation data with netadhict
C. Brown, A. Cowperthwaite, A. Hijazi, A. Somayaji
Published: 2009
An approach of DDoS attack detection using classifiers
K. J. Singh, T. De
Published: 2015
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, F. Tang
Published: 2011
A novel multi-stage approach for hierarchical intrusion detection
M. Verkerken, L. D’hooge, D. Sudyana, Y.-D. Lin, T. Wauters, B. Volckaert, F. De Turck
Published: 2023
Traffic classification on the fly
L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, K. Salamatian
Published: 2006
Real-time p2p traffic identification
J. Li, S. Zhang, Y. Lu, J. Yan
Published: 2008
Realtime encrypted traffic identification using machine learning
C. Gu, S. Zhang, Y. Sun
Published: 2011
A novel algorithm for encrypted traffic classification based on sliding window of flow’s first n packets
Y. Liu, J. Chen, P. Chang, X. Yun
Published: 2017
Dos and Don'ts of Machine Learning in Computer Security
Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck
Published: 10.19.2020
A novel hierarchical intrusion detection system based on decision tree and rules-based models
Ahmim A, Maglaras L, Ferrag MA
Published: 2019
Share