DeepDefense: Identifying DDoS Attack via Deep Learning

被引:233
作者
Yuan, Xiaoyong [1 ]
Li, Chuanhuang [2 ]
Li, Xiaolin [1 ]
机构
[1] Univ Florida, Large Scale Intelligent Syst Lab, Gainesville, FL 32611 USA
[2] Zhejiang Gongshang Univ, Hangzhou, Zhejiang, Peoples R China
来源
2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP) | 2017年
基金
美国国家科学基金会;
关键词
DDoS attack; deep learning; recurrent neural network; LSTM; DENIAL-OF-SERVICE; INTRUSION;
D O I
10.1109/smartcomp.2017.7946998
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Distributed Denial of Service (DDoS) attacks grow rapidly and become one of the fatal threats to the Internet. Automatically detecting DDoS attack packets is one of the main defense mechanisms. Conventional solutions monitor network traffic and identify attack activities from legitimate network traffic based on statistical divergence. Machine learning is another method to improve identifying performance based on statistical features. However, conventional machine learning techniques are limited by the shallow representation models. In this paper, we propose a deep learning based DDoS attack detection approach (called DeepDefense). Deep learning approach can automatically extract high-level features from low-level ones and gain powerful representation and inference. We design a recurrent deep neural network to learn patterns from sequences of network traffic and trace network attack activities. The experimental results demonstrate better performance of our model compared with conventional machine learning models. We reduce the error rate from 7.517% to 2.103% compared with conventional machine learning method in the larger data set.
引用
收藏
页码:9 / 16
页数:8
相关论文
共 39 条
  • [1] [Anonymous], 2002, WORLD WIDE WEB SECUR
  • [2] [Anonymous], ARXIV160903499
  • [3] [Anonymous], 2000, TECH REP
  • [4] [Anonymous], 1997, Neural Computation
  • [5] [Anonymous], 2000, P DARPA INFORM SURVI, DOI [DOI 10.1109/DISCEX.2000.821515, 10.1109/DISCEX.2000.821515]
  • [6] [Anonymous], DDOS ATT 2007 DAT
  • [7] [Anonymous], TECH REP
  • [8] [Anonymous], 2016, Tech. rep.
  • [9] [Anonymous], TECH REP
  • [10] [Anonymous], 2009, P 26 ANN INT C MACH, DOI DOI 10.1145/1553374.1553516