A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning

被引:152
作者
Arturo Perez-Diaz, Jesus [1 ]
Amezcua Valdovinos, Ismael [2 ]
Choo, Kim-Kwang Raymond [3 ,4 ]
Zhu, Dakai [4 ]
机构
[1] Tecnol Monterrey, Escuela Ingn & Ciencias, Monterrey 64849, Mexico
[2] Univ Colima, Fac Telemat, Colima 28040, Mexico
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[4] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
关键词
Computer crime; Computer architecture; Machine learning; Vegetation; Support vector machines; Control systems; IP networks; DDoS attack mitigation; low-rate DDoS (LR-DDoS) attacks; machine learning; software-defined network (SDN); INTRUSION DETECTION; SERVICE ATTACKS; SYSTEM;
D O I
10.1109/ACCESS.2020.3019330
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While there have been extensive studies of denial of service (DoS) attacks and DDoS attack mitigation, such attacks remain challenging to mitigate. For example, Low-Rate DDoS (LR-DDoS) attacks are known to be difficult to detect, particularly in a software-defined network (SDN). Hence, in this paper we present a flexible modular architecture that allows the identification and mitigation of LR-DDoS attacks in SDN settings. Specifically, we train the intrusion detection system (IDS) in our architecture using six machine learning (ML) models (i.e., J48, Random Tree, REP Tree, Random Forest, Multi-Layer Perceptron (MLP), and Support Vector Machines (SVM)) and evaluate their performance using the Canadian Institute of Cybersecurity (CIC) DoS dataset. The findings from the evaluation demonstrate that our approach achieves a detection rate of 95%, despite the difficulty in detecting LR-DoS attacks. We also remark that in our deployment, we use the open network operating system (ONOS) controller running on Mininet virtual machine in order for our simulated environment to be as close to real-world production networks as possible. In our testing topology, the intrusion prevention detection system mitigates all attacks previously detected by the IDS system. This demonstrates the utility of our architecture in identifying and mitigating LR-DDoS attacks.
引用
收藏
页码:155859 / 155872
页数:14
相关论文
共 58 条
[1]   Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges [J].
Agrawal, Neha ;
Tapaswi, Shashikala .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3769-3795
[2]  
[Anonymous], 2017, P ACM SOICT
[3]  
Apostolovic T, 2018, 2018 ZOOMING INNOVATION IN CONSUMER TECHNOLOGIES CONFERENCE (ZINC), P118, DOI 10.1109/ZINC.2018.8448570
[4]  
Arndt D., 2015, FLOWTBAG PROGRAM CAL
[5]   Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding [J].
Ayoob, Mustafa ;
Adi, Wael .
2015 SIXTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2015, :1-6
[6]  
Baskar M, 2013, INT C TREND COMPUT C, P373, DOI 10.1109/ICE-CCN.2013.6528526
[7]   Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation [J].
Bhuyan, M. H. ;
Kalwar, A. ;
Goswami, A. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, :706-710
[8]   Multi-Scale Low-Rate DDoS Attack Detection Using the Generalized Total Variation Metric [J].
Bhuyan, Monowar H. ;
Elmroth, Erik .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, :1040-1047
[9]  
Bhuyan MH, 2014, INT CONF CONTEMP, P80, DOI 10.1109/IC3.2014.6897151
[10]  
Bhuyan MH, 2014, COMPUT INFORM, V33, P1