Windower: Feature Extraction for Real-Time DDoS Detection Using Machine Learning

被引:1
作者
Goldschmidt, Patrik [1 ,2 ]
Kucera, Jan [1 ,3 ]
机构
[1] Brno Univ Technol, Brno, Czech Republic
[2] Kempelen Inst Intelligent Technol, Bratislava, Slovakia
[3] CESNET Ale, Prague, Czech Republic
来源
PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024 | 2024年
关键词
network intrusion detection; NIDS; DDoS mitigation; real-time; stream data mining; machine learning; NETWORK; CHALLENGES; ATTACKS;
D O I
10.1109/NOMS59830.2024.10575699
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks are an ever-increasing type of security incident on modern computer networks. To tackle the issue, we propose Windower, a feature-extraction method for real-time network-based intrusion (particularly DDoS) detection. Our stream data mining module employs a sliding window principle to compute statistical information directly from network packets. Furthermore, we summarize several such windows and compute inter-window statistics to increase detection reliability. Summarized statistics are then fed into an ML-based attack discriminator. If an attack is recognized, we drop the consequent attacking source's traffic using simple ACL rules. The experimental results evaluated on several datasets indicate the ability to reliably detect an ongoing attack within the first six seconds of its start and mitigate 99% of flood and 92% of slow attacks while maintaining false positives below 1%. In contrast to state-of-the-art, our approach provides greater flexibility by achieving high detection performance and low resources as flow-based systems while offering prompt attack detection known from packet-based solutions. Windower thus brings an appealing trade-off between attack detection performance, detection delay, and computing resources suitable for real-world deployments.
引用
收藏
页数:10
相关论文
共 62 条
[1]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[2]  
[Anonymous], DDoS attack 2007" dataset
[3]  
[Anonymous], 2000, document RFC 2827, DOI 10.17487/RFC2827
[4]   SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection [J].
Apruzzese, Giovanni ;
Laskov, Pavel ;
Schneider, Johannes .
2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, :592-614
[5]   The Role of Machine Learning in Cybersecurity [J].
Apruzzese, Giovanni ;
Laskov, Pavel ;
de Oca, Edgardo Montes ;
Mallouli, Wissam ;
Rapa, Luis Burdalo ;
Grammatopoulos, Athanasios Vasileios ;
Di Franco, Fabio .
DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (01)
[6]  
Apruzzese Giovanni, 2022, Digital Threats, V3
[7]  
Arp D, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P3971
[8]   Characterizing DDoS attacks and flash events: Review, research gaps and future directions [J].
Behal, Sunny ;
Kumar, Krishan ;
Sachdeva, Monika .
COMPUTER SCIENCE REVIEW, 2017, 25 :101-114
[9]   An anomaly based distributed detection system for DDoS attacks in Tier-2 ISP networks [J].
Bhandari, Abhinav ;
Kumar, Krishan ;
Sangal, A. L. ;
Behal, Sunny .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) :1387-1406
[10]   Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions [J].
Bhardwaj, Aanshi ;
Mangat, Veenu ;
Vig, Renu ;
Halder, Subir ;
Conti, Mauro .
COMPUTER SCIENCE REVIEW, 2021, 39