Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks

被引:47
作者
Singh, Khundrakpam Johnson [1 ]
Thongam, Khelchandra [2 ]
De, Tanmay [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Durgapur 713209, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Manipur 795001, India
关键词
DDoS attack; entropy; GA; MLP; variance;
D O I
10.3390/e18100350
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Distributed denial-of-service (DDoS) attack is one of the major threats to the web server. The rapid increase of DDoS attacks on the Internet has clearly pointed out the limitations in current intrusion detection systems or intrusion prevention systems (IDS/IPS), mostly caused by application-layer DDoS attacks. Within this context, the objective of the paper is to detect a DDoS attack using a multilayer perceptron (MLP) classification algorithm with genetic algorithm (GA) as learning algorithm. In this work, we analyzed the standard EPA-HTTP (environmental protection agency-hypertext transfer protocol) dataset and selected the parameters that will be used as input to the classifier model for differentiating the attack from normal profile. The parameters selected are the HTTP GET request count, entropy, and variance for every connection. The proposed model can provide a better accuracy of 98.31%, sensitivity of 0.9962, and specificity of 0.0561 when compared to other traditional classification models.
引用
收藏
页数:17
相关论文
共 31 条
[1]  
Aung W. T., 2009, P IEEE AS PAC C SERV
[2]   Tackling Application-layer DDoS Attacks [J].
Beitollahi, Hakem ;
Deconinck, Geert .
ANT 2012 AND MOBIWIS 2012, 2012, 10 :432-441
[3]   A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events [J].
Bhatia, Sajal ;
Schmidt, Desmond ;
Mohay, George ;
Tickle, Alan .
COMPUTERS & SECURITY, 2014, 40 :95-107
[4]   GA-based learning for rule identification in fuzzy neural networks [J].
Dahal, Keshav ;
Almejalli, Khaled ;
Hossain, M. Alamgir ;
Chen, Wenbing .
APPLIED SOFT COMPUTING, 2015, 35 :605-617
[5]   DDoS Attack Detection using Fast Entropy Approach on Flow-Based Network Traffic [J].
David, Jisa ;
Thomas, Ciza .
BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 :30-36
[6]   Network attacks: Taxonomy, tools and systems [J].
Hoque, N. ;
Bhuyan, Monowar H. ;
Baishya, R. C. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 40 :307-324
[7]  
Hunter P., 2003, Network Security, P12
[8]   Evolutionary RBF classifier for polarimetric SAR images [J].
Ince, Turker ;
Kiranyaz, Serkan ;
Gabbouj, Moncef .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (05) :4710-4717
[9]  
Jaswal K., 2015, P 4 INT C INF TECHN
[10]   Performance of HTTP Protocol in Networked Control Systems [J].
Jestratjew, Arkadiusz ;
Kwiecien, Andrzej .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) :271-276