HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic

被引:1
作者
Kopmann, Samuel [1 ]
Heseding, Hauke [1 ,2 ]
Zitterbart, Martina [1 ,2 ]
机构
[1] Karlsruhe Inst Technol, Inst Telemat, Karlsruhe, Germany
[2] KASTEL Secur Res Labs, Karlsruhe, Germany
来源
PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022) | 2022年
关键词
DDoS; Intrusion Detection; CNNs; Traffic Monitoring; Image Classification;
D O I
10.1109/LCN53696.2022.9843465
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fast detection of Distributed Denial of Service attacks is key for establishing appropriate countermeasures in order to protect potential targets. HollywooDDoS applies well-known techniques from movie classification to the challenge of DDoS detection. The proposed approach utilizes a traffic aggregation scheme representing traffic volumes between IP subnets as two-dimensional images, while preserving detection relevant traffic characteristics. These images serve as input for a convolutional neural network, learning IP address space distributions of both background and attack traffic intensities. It is shown that a real-world DDoS attack can be precisely detected on the time scale of milliseconds. We evaluate classification of images without temporal information about attack traffic development to outline the impact of image resolution and aggregation time frames. We then show that attack detection further improves by 17% when utilizing a consecutive series of images capturing traffic dynamics.
引用
收藏
页码:90 / 97
页数:8
相关论文
共 50 条
  • [1] Detecting Web Attacks in Severely Imbalanced Network Traffic Data
    Zuech, Richard
    Hancock, John
    Khoshgoftaar, Taghi M.
    2021 IEEE 22ND INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2021), 2021, : 267 - 273
  • [2] Detecting DDoS Attacks Using Dispersible Traffic Matrix and Weighted Moving Average
    Kim, Tae Hwan
    Kim, Dong Seong
    Lee, Sang Min
    Park, Jong Sou
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 290 - +
  • [3] Detecting network attacks in the Internet via statistical network traffic normality prediction
    Jiang J.
    Papavassiliou S.
    Journal of Network and Systems Management, 2004, 12 (1) : 51 - 72
  • [4] Detecting Attacks in Network Traffic Using Normality Models: The Cellwise Estimator
    Heine, Felix
    Kleiner, Carsten
    Klostermeyer, Philip
    Ahlers, Volker
    Laue, Tim
    Wellermann, Nils
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 265 - 282
  • [5] Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder
    Pratomo, Baskoro Adi
    Burnap, Pete
    Theodorakopoulos, George
    2018 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2018,
  • [6] FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows
    Sacramento, Luis
    Medeiros, Iberia
    Bota, Joao
    Correial, Miguel
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 567 - 572
  • [7] A peer-to-peer architecture for detecting attacks from network traffic and log data
    Folino, Francesco
    Folino, Gianluigi
    Pontieri, Luigi
    Sabatino, Pietro
    2017 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2017, : 769 - 776
  • [8] Detecting Network Attacks Based on Behavioral Commonalities
    Najafabadi, Maryam M.
    Khoshgoftaar, Taghi M.
    Napolitano, Amri
    INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2016, 23 (01)
  • [9] Detecting network cyber-attacks using an integrated statistical approach
    Bouyeddou, Benamar
    Harrou, Fouzi
    Kadri, Benamar
    Sun, Ying
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453
  • [10] Detecting cybersecurity attacks across different network features and learners
    Joffrey L. Leevy
    John Hancock
    Richard Zuech
    Taghi M. Khoshgoftaar
    Journal of Big Data, 8