A Novel Real-Time DDoS Attack Detection Mechanism Based on MDRA Algorithm in Big Data

被引:18
作者
Jia, Bin [1 ,2 ,3 ]
Ma, Yan [1 ]
Huang, Xiaohong [1 ]
Lin, Zhaowen [1 ,2 ,3 ]
Sun, Yi [2 ,3 ,4 ,5 ]
机构
[1] Beijing Univ Posts & Telecommun, Inst Network Technol, Informat & Network Ctr, Beijing 100876, Peoples R China
[2] Sci & Technol Informat Transmiss & Disseminat Com, Shijiazhuang 050081, Peoples R China
[3] Natl Engn Lab Mobile Network Secur 2013 2685, Beijing 100876, Peoples R China
[4] Beijing Univ Posts & Telecommun, Inst Network Technol, Network & Informat Ctr, Beijing 100876, Peoples R China
[5] Beijing Univ Posts & Telecommun, Inst Sensing Technol & Business, Beijing 100876, Peoples R China
关键词
SYSTEM; MODEL;
D O I
10.1155/2016/1467051
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the wake of the rapid development and wide application of information technology and Internet, our society has come into the information explosion era. Meanwhile, it brings in new and severe challenges to the field of network attack behavior detection due to the explosive growth and high complexity of network traffic. Therefore, an effective and efficient detection mechanism that can detect attack behavior from large scale of network traffic plays an important role. In this paper, we focus on how to distinguish the attack traffic from normal data flows in Big Data and propose a novel real-time DDoS attack detection mechanism based on Multivariate Dimensionality Reduction Analysis (MDRA). In this mechanism, we first reduce the dimensionality of multiple characteristic variables in a network traffic record by Principal Component Analysis (PCA). Then, we analyze the correlation of the lower dimensional variables. Finally, the attack traffic can be differentiated from the normal traffic by MDRA and Mahalanobis distance ( MD). Compared with previous research methods, our experimental results show that higher precision rate is achieved and it approximates to 100% in True Negative Rate (TNR) for detection; CPU computing time is one-eightieth and memory resource consumption is one-third of the previous detection method based on Multivariate Correlation Analysis (MCA); computing complexity is constant.
引用
收藏
页数:10
相关论文
共 25 条
  • [1] [Anonymous], 2000, P DARPA INFORM SURVI, DOI [DOI 10.1109/DISCEX.2000.821515, 10.1109/DISCEX.2000.821515]
  • [2] [Anonymous], 2010, 2010 IEEE GLOB TEL C
  • [3] [Anonymous], 2010, INT J ELECT COMPUT S
  • [4] Bae C, 2012, INT J INNOV COMPUT I, V8, P8231
  • [5] Bhange Anup, 2012, INT J COMPUTER APPL, V40, P36
  • [6] Criscuolo P. J., 2000, CIAC2319 LAWR LIV NA
  • [7] Analysis of a complex of statistical variables into principal components
    Hotelling, H
    [J]. JOURNAL OF EDUCATIONAL PSYCHOLOGY, 1933, 24 : 417 - 441
  • [8] A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
    Khor, Kok-Chin
    Ting, Choo-Yee
    Phon-Amnuaisuk, Somnuk
    [J]. APPLIED INTELLIGENCE, 2012, 36 (02) : 320 - 329
  • [9] Kim M, 2004, LECT NOTES COMPUT SC, V3090, P943
  • [10] DDoS attack detection method using cluster analysis
    Lee, Keunsoo
    Kim, Juhyun
    Kwon, Ki Hoon
    Han, Younggoo
    Kim, Sehun
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2008, 34 (03) : 1659 - 1665