Robust DDoS attack detection with adaptive transfer learning

被引:7
作者
Anley, Mulualem Bitew [1 ]
Genovese, Angelo [1 ]
Agostinello, Davide [1 ]
Piuri, Vincenzo [1 ]
机构
[1] Univ Milan, Dept Comp Sci, Milan, Italy
关键词
Cyber security; Deep learning; Transfer learning; INTRUSION DETECTION;
D O I
10.1016/j.cose.2024.103962
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the evolving cybersecurity landscape, the rising frequency of Distributed Denial of Service (DDoS) attacks requires robust defense mechanisms to safeguard network infrastructure availability and integrity. Deep Learning (DL) models have emerged as a promising approach for DDoS attack detection and mitigation due to their capability of automatically learning feature representations and distinguishing complex patterns within network traffic data. However, the effectiveness of DL models in protecting against evolving attacks depends also on the design of adaptive architectures, through the combination of appropriate models, quality data, and thorough hyperparameter optimizations, which are scarcely performed in the literature. Also, within adaptive architectures for DDoS detection, no method has yet addressed how to transfer knowledge between different datasets to improve classification accuracy. In this paper, we propose an innovative approach for DDoS detection by leveraging Convolutional Neural Networks (CNN), adaptive architectures, and transfer learning techniques. Experimental results on publicly available datasets show that the proposed adaptive transfer learning method effectively identifies benign and malicious activities and specific attack categories.
引用
收藏
页数:10
相关论文
共 41 条
[1]   Analysis of KDD Dataset Attributes - Class wise For Intrusion Detection [J].
Aggarwal, Preeti ;
Sharma, Sudhir Kumar .
3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 :842-851
[2]   Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques [J].
Agostinello, Davide ;
Genovese, Angelo ;
Piuri, Vincenzo .
PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, :267-275
[3]   Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3769-3795
[4]   A new DDoS attacks intrusion detection model based on deep learning for cybersecurity [J].
Akgun, Devrim ;
Hizal, Selman ;
Cavusoglu, Unal .
COMPUTERS & SECURITY, 2022, 118
[5]   Intrusion detection in Edge-of-Things computing [J].
Almogren, Ahmad S. .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 :259-265
[6]  
Bay S.D., 2000, ACM SIGKDD Explor. Newsl., V2, P81
[7]  
Chadd Anthony, 2018, Network Security, V2018, P13, DOI 10.1016/S1353-4858(18)30069-2
[8]   Multi-Classifier of DDoS Attacks in Computer Networks Built on Neural Networks [J].
Chartuni, Andres ;
Marquez, Jose .
APPLIED SCIENCES-BASEL, 2021, 11 (22)
[9]   DAD-MCNN: DDoS Attack Detection via Multi-channel CNN [J].
Chen, Jinyin ;
Yang, Yi-tao ;
Hu, Ke-ke ;
Zheng, Hai-bin ;
Wang, Zhen .
ICMLC 2019: 2019 11TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, 2019, :484-488
[10]   Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning [J].
Cheng, Jieren ;
Zhang, Chen ;
Tang, Xiangyan ;
Sheng, Victor S. ;
Dong, Zhe ;
Li, Junqi .
SECURITY AND COMMUNICATION NETWORKS, 2018,