Information-Theoretic Ensemble Learning for DDoS Detection with Adaptive Boosting

被引:3
作者
Bhuyan, Monowar H. [1 ,2 ,4 ]
Ma, Maode [3 ]
Kadobayashi, Youki [1 ]
Elmroth, Erik [2 ]
机构
[1] NAIST, Lab Cyber Resilience, Nara 6300192, Japan
[2] Umea Univ, Dept Comp Sci, SE-90187 Umea, Sweden
[3] Nanyang Technol Univ, Sch Elect & Elect Engn, Nanyang Ave, Singapore 639798, Singapore
[4] Assam Kaziranga Univ, Dept Comp Sci & Engn, Jorhat, Assam, India
来源
2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019) | 2019年
关键词
DDoS attack; ensemble learning; information metric; network traffic; low-rate; high-rate;
D O I
10.1109/ICTAI.2019.00140
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
DDoS (Distributed Denial of Service) attacks pose a serious threat to the Internet as they use large numbers of zombie hosts to forward massive numbers of packets to the target host. Here, we present an adaptive boosting-based ensemble learning model for detecting low-and high-rate DDoS attacks by combining information divergence measures. Our model is trained against a baseline model that does not use labeled traffic data and draws on multiple baseline models developed in parallel to improve its accuracy. Incoming traffic is sampled time-periodically to characterize the normal behavior of input traffic. The model's performance is evaluated using the UmU testbed, MIT legitimate, and CAIDA DDoS datasets. We demonstrate that our model offers superior accuracy to established alternatives, reducing the incidence of false alarms and achieving an F1-score that is around 3% better than those of current state-of-the-art DDoS detection models.
引用
收藏
页码:995 / 1002
页数:8
相关论文
共 19 条
[1]  
[Anonymous], 2002, ANN OPERATIONS RES
[2]  
[Anonymous], 2012, ELEMENTS INFORM THEO
[3]   Multi-Scale Low-Rate DDoS Attack Detection Using the Generalized Total Variation Metric [J].
Bhuyan, Monowar H. ;
Elmroth, Erik .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, :1040-1047
[4]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[5]   A tool for the generation of realistic network workload for emerging networking scenarios [J].
Botta, Alessio ;
Dainotti, Alberto ;
Pescape, Antonio .
COMPUTER NETWORKS, 2012, 56 (15) :3531-3547
[6]  
CAIDA, 2011, CAIDA DDOS ATTACK 20
[7]   Introducing the SlowDrop Attack [J].
Cambiaso, Enrico ;
Chiola, Giovanni ;
Aiello, Maurizio .
COMPUTER NETWORKS, 2019, 150 (234-249) :234-249
[8]   Power spectrum entropy based detection and mitigation of low-rate DoS attacks [J].
Chen, Zhaomin ;
Yeo, Chai Kiat ;
Lee, Bu Sung ;
Lau, Chiew Tong .
COMPUTER NETWORKS, 2018, 136 :80-94
[9]   Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic [J].
David, Jisa ;
Thomas, Ciza .
COMPUTERS & SECURITY, 2019, 82 :284-295
[10]  
Dietterich T., 2002, ENSEMBLE LEARNING, P110