An Abnormal Network Flow Feature Sequence Prediction Approach for DDoS Attacks Detection in Big Data Environment

被引:73
作者
Cheng, Jieren [1 ,2 ]
Xu, Ruomeng [1 ]
Tang, Xiangyan [1 ]
Sheng, Victor S. [3 ]
Cai, Canting [1 ]
机构
[1] Hainan Univ, Sch Informat Sci & Technol, Haikou 570228, Hainan, Peoples R China
[2] State Key Lab Marine Resource Utilizat South Chin, Haikou 570228, Hainan, Peoples R China
[3] Univ Cent Arkansas, Dept Comp Sci, Conway, AR 72035 USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2018年 / 55卷 / 01期
基金
中国国家自然科学基金;
关键词
DDoS attack; time series prediction; ARIMA; big data; TRUST EVALUATION; DEFENSE; FRAMEWORK;
D O I
10.3970/cmc.2018.055.095
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed denial-of-service (DDoS) is a rapidly growing problem with the fast development of the Internet. There are multitude DDoS detection approaches, however, three major problems about DDoS attack detection appear in the big data environment. Firstly, to shorten the respond time of the DDoS attack detector; secondly, to reduce the required compute resources; lastly, to achieve a high detection rate with low false alarm rate. In the paper, we propose an abnormal network flow feature sequence prediction approach which could fit to be used as a DDoS attack detector in the big data environment and solve aforementioned problems. We define a network flow abnormal index as PDRA with the percentage of old BP addresses, the increment of the new BP addresses, the ratio of new IP addresses to the old BP addresses and average accessing rate of each new IP address. We design an IP address database using sequential storage model which has a constant time complexity. The autoregressive integrated moving average (ARIMA) trending prediction module will be started if and only if the number of continuous PDRA sequence value, which all exceed an PDRA abnormal threshold (PAT), reaches a certain preset threshold. And then calculate the probability that is the percentage of forecasting PDRA sequence value which exceed the PAT. Finally we identify the DDoS attack based on the abnormal probability of the forecasting PDRA sequence. Both theorem and experiment show that the method we proposed can effectively reduce the compute resources consumption, identify DDoS attack at its initial stage with higher detection rate and lower false alarm rate.
引用
收藏
页码:95 / 119
页数:25
相关论文
共 33 条
[1]  
[Anonymous], STUDY EFFICIENT DETE
[2]  
[Anonymous], 2004, PROACTIVELY DETECTIN
[3]  
[Anonymous], CISC VIS NETW IND FO
[4]  
[Anonymous], 2017, COMPUTER SCI INFORM
[5]   DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions [J].
Bawany, Narmeen Zakaria ;
Shamsi, Jawwad A. ;
Salah, Khaled .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) :425-441
[6]   Detection of DDoS attacks and flash events using novel information theory metrics [J].
Behal, Sunny ;
Kumar, Krishan .
COMPUTER NETWORKS, 2017, 116 :96-110
[7]   DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks [J].
Boro, Debojit ;
Bhattacharyya, Dhruba K. .
MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS, 2017, 23 (03) :593-611
[8]   ICMPv6-Based DoS and DDoS Attacks and Defense Mechanisms: Review [J].
Elejla, Omar E. ;
Anbar, Mohammed ;
Belaton, Bahari .
IETE TECHNICAL REVIEW, 2017, 34 (04) :390-407
[9]   Structural Minimax Probability Machine [J].
Gu, Bin ;
Sun, Xingming ;
Sheng, Victor S. .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2017, 28 (07) :1646-1656
[10]   STONE: A streaming DDoS defense framework [J].
Gulisano, Vincenzo ;
Callau-Zori, Mar ;
Fu, Zhang ;
Jimenez-Peris, Ricardo ;
Papatriantafilou, Marina ;
Patino-Martinez, Marta .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (24) :9620-9633