Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques

被引:3
作者
Agostinello, Davide [1 ]
Genovese, Angelo [1 ]
Piuri, Vincenzo [1 ]
机构
[1] Univ Milan, Dept Comp Sci, Milan, MI, Italy
来源
PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023 | 2023年
关键词
Deep Learning; Intrusion Detection System; DDoS;
D O I
10.5220/0012146100003555
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing number of connected devices is fostering a rising frequency of cyber attacks, with Distributed Denial of Service (DDoS) attacks among the most common. To counteract DDoS, companies and large organizations are increasingly deploying anomaly-based Intrusion Detection Systems (IDS), which detect attack patterns by analyzing differences in malicious network traffic against a baseline of legitimate traffic. To differentiate malicious and normal traffic, methods based on artificial intelligence and, in particular, Deep Learning (DL) are being increasingly considered, due to their ability to automatically learn feature representations for the different traffic types, without need of explicit programming or handcrafted feature extraction. In this paper, we propose a novel methodology for simulating an anomaly-based IDS based on adaptive DL by designing multiple DL models working with both binary and multi-label classification on multiple datasets with different degrees of complexity. To make the DL models adaptable to different conditions, we consider adaptive architectures obtained by automatically tuning the number of neurons for each situation. Results on publicly-available datasets confirm the validity of our proposed methodology, with DL models adapting to the different conditions by increasing the number of neurons on more complex datasets and achieving the highest accuracy in the binary classification configuration.
引用
收藏
页码:267 / 275
页数:9
相关论文
共 27 条
[1]  
Alasadi SuadA., 2017, J ENG APPL SCI, V12, P4102, DOI [DOI 10.3923/JEASCI.2017.4102.4107, 10.36478/jeasci.2017.4102.4107, DOI 10.36478/JEASCI.2017.4102.4107]
[2]   Composite and efficient DDoS attack detection framework for B5G networks [J].
Amaizu, G. C. ;
Nwakanma, C., I ;
Bhardwaj, S. ;
Lee, J. M. ;
Kim, D. S. .
COMPUTER NETWORKS, 2021, 188
[3]   DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning [J].
Asad, Muhammad ;
Asim, Muhammad ;
Javed, Talha ;
Beg, Mirza O. ;
Mujtaba, Hasan ;
Abbas, Sohail .
COMPUTER JOURNAL, 2020, 63 (07) :983-994
[4]   A GRU deep learning system against attacks in software defined networks [J].
Assis, Marcos V. O. ;
Carvalho, Luiz F. ;
Lloret, Jaime ;
Proenca, Mario L. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 177
[5]   Hyperband Tuned Deep Neural Network With Well Posed Stacked Sparse AutoEncoder for Detection of DDoS Attacks in Cloud [J].
Bhardwaj, Aanshi ;
Mangat, Veenu ;
Vig, Renu .
IEEE ACCESS, 2020, 8 :181916-181929
[6]   Multi-Classifier of DDoS Attacks in Computer Networks Built on Neural Networks [J].
Chartuni, Andres ;
Marquez, Jose .
APPLIED SCIENCES-BASEL, 2021, 11 (22)
[7]  
CIC, 2018, Cse-cic-ids-2018
[8]  
CIC, 2019, Cic-ddos-2019
[9]   Detection of DDoS attacks with feed forward based deep neural network model [J].
Cil, Abdullah Emir ;
Yildiz, Kazim ;
Buldu, Ali .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 169
[10]   Near real-time security system applied to SDN environments in IoT networks using convolutional neural network [J].
de Assis, Marcos V. O. ;
Carvalho, Luiz F. ;
Rodrigues, Joel J. P. C. ;
Lloret, Jaime ;
Proenca Jr, Mario L. .
COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86