HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic

被引:1
作者
Kopmann, Samuel [1 ]
Heseding, Hauke [1 ,2 ]
Zitterbart, Martina [1 ,2 ]
机构
[1] Karlsruhe Inst Technol, Inst Telemat, Karlsruhe, Germany
[2] KASTEL Secur Res Labs, Karlsruhe, Germany
来源
PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022) | 2022年
关键词
DDoS; Intrusion Detection; CNNs; Traffic Monitoring; Image Classification;
D O I
10.1109/LCN53696.2022.9843465
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fast detection of Distributed Denial of Service attacks is key for establishing appropriate countermeasures in order to protect potential targets. HollywooDDoS applies well-known techniques from movie classification to the challenge of DDoS detection. The proposed approach utilizes a traffic aggregation scheme representing traffic volumes between IP subnets as two-dimensional images, while preserving detection relevant traffic characteristics. These images serve as input for a convolutional neural network, learning IP address space distributions of both background and attack traffic intensities. It is shown that a real-world DDoS attack can be precisely detected on the time scale of milliseconds. We evaluate classification of images without temporal information about attack traffic development to outline the impact of image resolution and aggregation time frames. We then show that attack detection further improves by 17% when utilizing a consecutive series of images capturing traffic dynamics.
引用
收藏
页码:90 / 97
页数:8
相关论文
共 50 条
  • [21] Detecting Network Scanning Through Monitoring and Manipulation of DNS Traffic
    Jafarian, Jafar Haadi
    Abolfathi, Masoumeh
    Rahimian, Mahsa
    IEEE ACCESS, 2023, 11 : 20267 - 20283
  • [22] A new statistical method for detecting network anomalies in TCP traffic
    Callegari, Christian
    Vaton, Sandrine
    Pagano, Michele
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2010, 21 (07): : 575 - 588
  • [23] Detecting anomalous network traffic with self-organizing maps
    Ramadas, M
    Ostermann, S
    Tjaden, B
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2003, 2820 : 36 - 54
  • [24] Detecting Distributed Denial of Service in Network Traffic with Deep Learning
    Rusyaidi, Muhammad
    Jaf, Sardar
    Ibrahim, Zunaidi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 34 - 41
  • [25] Detecting Network Traffic Intrusions on Memory Constrained Embedded Systems
    Su, Shiyu
    Nwafor, Ebelechukwu
    2021 IEEE VIRTUAL IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY, 2021,
  • [26] A Method for Detecting Wide-scale Network Traffic Anomalies
    Wang Minghua(National Computer Network Emergency Response Technical Team/Coordination Center(CNCERT/CC)
    ZTECommunications, 2007, (04) : 19 - 23
  • [27] Detecting Anomalous Latent Classes in a Batch of Network Traffic Flows
    Kocak, Fatih
    Miller, David J.
    Kesidis, George
    2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2014,
  • [28] Detecting Malign Encrypted Network Traffic Using Perlin Noise and Convolutional Neural Network
    Bazuhair, Wajdi
    Lee, Wonjun
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 200 - 206
  • [29] A Cluster-based Approach Towards Detecting and Modeling Network Dictionary Attacks
    Siahmarzkooh, Aliakbar Tajari
    Karimpour, Jaber
    Lotfi, Shahriar
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2016, 6 (06) : 1227 - 1234
  • [30] An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network
    Cai, Jiwen
    Yi, Ping
    Chen, Jialin
    Wang, Zhiyang
    Liu, Ning
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 775 - 780