Anomaly Detection Techniques for Different DDoS Attack Types

被引:0
|
作者
Gniewkowski, Mateusz [1 ]
Maciejewski, Henryk [1 ]
Surmacz, Tomasz [1 ]
机构
[1] Wroclaw Univ Sci & Technol, Fac Informat & Commun Technol, Wroclaw, Poland
来源
NEW ADVANCES IN DEPENDABILITY OF NETWORKS AND SYSTEMS, DEPCOS-RELCOMEX 2022 | 2022年 / 484卷
关键词
Computer network intrusion detection; Machine learning; Unsupervised anomaly/outlier detection; DDoS; Cybersecurity;
D O I
10.1007/978-3-031-06746-4_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malicious activities in computer network systems often generate patterns in network data that do not conform to normal behaviour. Since the nature of such anomalies may be different for different types of attacks, detection of these is not trivial and may require specific anomaly detection techniques. In this work, we focus on anomaly or outlier detection techniques for DDoS attacks on computer networks. Our main goal is to find such techniques that prove most appropriate for different types of attacks. We restrict our research to fully unsupervised methods, because, in real world scenarios, it is difficult to obtain examples of all possible anomalies, especially that the set of those is constantly growing. To the best of our knowledge, our work is the first that utilizes time-related features in a purely unsupervised manner and that provides a fair comparison between widely known outlier detection methods. We evaluate clustering, autoencoder and LSTM-based techniques on commonly used datasets, i.e. DARPA1998, ISCXIDS2012, CICDDOS2019. Moreover, we propose IQRPACF method that combines IQR with partial autocorrelation function. The proposed method not only does not require to be trained, but also, in most cases, outperforms the other solutions.
引用
收藏
页码:63 / 78
页数:16
相关论文
共 50 条
  • [1] The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment
    Hossein Abbasi
    Naser Ezzati-Jivan
    Martine Bellaiche
    Chamseddine Talhi
    Michel R. Dagenais
    Journal of Hardware and Systems Security, 2021, 5 (3-4) : 208 - 222
  • [2] Detection and analysis types of DDoS attack
    Navruzov, Erkin
    Kabulov, Anvar
    2022 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2022, : 203 - 209
  • [3] Traffic Anomaly Detection in DDos Flooding Attack
    Purwanto, Yudha
    Hendrawan, Kuspriyanto
    Rahardjo, Budi
    2014 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2014,
  • [4] Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques
    Agostinello, Davide
    Genovese, Angelo
    Piuri, Vincenzo
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 267 - 275
  • [5] DDoS Attack Detection: Strategies, Techniques, and Future Directions
    Patil, Vinay Tila
    Deore, Shailesh Shivaji
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (09) : 2030 - 2046
  • [6] DDoS attack detection techniques in IoT networks: a survey
    Pakmehr, Amir
    Assmuth, Andreas
    Taheri, Negar
    Ghaffari, Ali
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 14637 - 14668
  • [7] An anomaly-based approach for DDoS attack detection in cloud environment
    Rawashdeh, Adnan
    Alkasassbeh, Mouhammd
    Al-Hawawreh, Muna
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2018, 57 (04) : 312 - 324
  • [8] DDoS Attack Detection and Mitigation Techniques in Cloud Computing Environment
    Devi, Kiruthika B. S.
    Subbulakshmi, T.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 512 - 517
  • [9] EFFICIENT DDoS ATTACK DETECTION USING MACHINE LEARNING TECHNIQUES
    Nazarudeen, Fathima
    Sundar, Sumod
    2022 IEEE INTERNATIONAL POWER AND RENEWABLE ENERGY CONFERENCE, IPRECON, 2022,
  • [10] Traffic Anomaly Detection and DDOS Attack Recognition Using Diffusion Map Technologies
    Zheludev, Michael
    Nagradov, Evgeny
    TENTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGIES REVISED SELECTED PAPERS CSIT-2015, 2015, : 128 - 132