HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic

被引:1
作者
Kopmann, Samuel [1 ]
Heseding, Hauke [1 ,2 ]
Zitterbart, Martina [1 ,2 ]
机构
[1] Karlsruhe Inst Technol, Inst Telemat, Karlsruhe, Germany
[2] KASTEL Secur Res Labs, Karlsruhe, Germany
来源
PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022) | 2022年
关键词
DDoS; Intrusion Detection; CNNs; Traffic Monitoring; Image Classification;
D O I
10.1109/LCN53696.2022.9843465
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fast detection of Distributed Denial of Service attacks is key for establishing appropriate countermeasures in order to protect potential targets. HollywooDDoS applies well-known techniques from movie classification to the challenge of DDoS detection. The proposed approach utilizes a traffic aggregation scheme representing traffic volumes between IP subnets as two-dimensional images, while preserving detection relevant traffic characteristics. These images serve as input for a convolutional neural network, learning IP address space distributions of both background and attack traffic intensities. It is shown that a real-world DDoS attack can be precisely detected on the time scale of milliseconds. We evaluate classification of images without temporal information about attack traffic development to outline the impact of image resolution and aggregation time frames. We then show that attack detection further improves by 17% when utilizing a consecutive series of images capturing traffic dynamics.
引用
收藏
页码:90 / 97
页数:8
相关论文
共 50 条
  • [41] A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
    Morales-Molina, Carlos D.
    Hernandez-Suarez, Aldo
    Sanchez-Perez, Gabriel
    Toscano-Medina, Linda K.
    Perez-Meana, Hector
    Olivares-Mercado, Jesus
    Portillo-Portillo, Jose
    Sanchez, Victor
    Garcia-Villalba, Luis Javier
    SENSORS, 2021, 21 (09)
  • [42] A scalable network intrusion detection system towards detecting, discovering, and learning unknown attacks
    Zhao Zhang
    Yong Zhang
    Da Guo
    Mei Song
    International Journal of Machine Learning and Cybernetics, 2021, 12 : 1649 - 1665
  • [43] A scalable network intrusion detection system towards detecting, discovering, and learning unknown attacks
    Zhang, Zhao
    Zhang, Yong
    Guo, Da
    Song, Mei
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2021, 12 (06) : 1649 - 1665
  • [44] Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance
    Ibrahim, Amin
    Martin, Miguel Vargas
    DIGITAL FORENSICS AND CYBER CRIME, 2010, 31 : 139 - 150
  • [45] A Novel Multi Scale Approach for Detecting High Bandwidth Aggregates in Network Traffic
    Kaur, Gagandeep
    Saxena, Vikas
    Gupta, J. P.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 81 - 100
  • [46] Detecting Network Security Threats Using Domain Name System and NetFlow Traffic
    Hananto, Rinkel
    Lim, Charles
    Ipung, Heru Purnomo
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 105 - 109
  • [47] Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic
    Zolotukhin, Mikhail
    Kokkonen, Tero
    Hamalainen, Timo
    Siltanen, Jarmo
    INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2016/USMART 2016, 2016, 9870 : 326 - 338
  • [48] Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic
    Wichmann, Pascal
    Marx, Matthias
    Federrath, Hannes
    Fischer, Mathias
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [49] Compiling network traffic into rules using soft computing methods for the detection of flooding attacks
    Noh, Sanguk
    Jung, Gihyun
    Choi, Kyunghee
    Lee, Cheolho
    APPLIED SOFT COMPUTING, 2008, 8 (03) : 1200 - 1210
  • [50] Addressing Privacy Constraints for Efficient Monitoring of Network Traffic for Illicit Images
    Ibrahim, Amin
    Martin, Miguel Vargas
    IEEE TIC-STH 09: 2009 IEEE TORONTO INTERNATIONAL CONFERENCE: SCIENCE AND TECHNOLOGY FOR HUMANITY, 2009, : 302 - 308