DDoS Attack Detection Using IP Address Feature Interaction

被引:20
作者
Cheng, Jieren [1 ]
Yin, Jianping [1 ]
Liu, Yun [1 ]
Cai, Zhiping [1 ]
Wu, Chengkun [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS 2009) | 2009年
关键词
Network Security; Distributed Denial of Service; IP Address Interaction Feature; SVM classifier; DEFENSE;
D O I
10.1109/INCOS.2009.34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed denial-of-service (DDoS) attacks present serious threats to servers in the Internet. We argue that the difference of the goals, manners and results of the interaction behaviors of normal flows and attack flows, which show different characteristics on IP addresses and ports. IAI (TP Address Interaction Feature) algorithm is proposed based on the addresses interaction, abrupt traffic change, addresses many-to-one dissymmetry, distributed source IP addresses and concentrated target addresses. The IAI is designed to describe the essential characteristics of network flow states. Furthermore, a support vector machine (SVM) classifier, which is trained by IAI time series from normal flow and attack flow, is applied to classify the state of current network flows and identify the DDoS attacks. The experiment results show that, IAI can reflect the different characteristics of DDoS attack flows and normal flows; the IAI-based detection scheme can distinguish between normal flows and abnormal flows with DDoS attack flows effectively, and help to identify fast and accurate attack flows when the attacking traffic is hidden among a relatively large volume of normal flows or close to the attacking sources, and it has higher detection and lower false alarm rate compared with related works.
引用
收藏
页码:113 / 118
页数:6
相关论文
共 50 条
  • [31] Study on Detection Algorithm of DDoS Attack for Cloud Computing
    Luo Ya-dong
    2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA), 2014, : 950 - 953
  • [32] Research on DDoS Attack Detection in Software Defined Network
    Ma Zhao-hui
    Zhao Gan-sen
    Li Wei-wen
    Mo Ze-feng
    Wang Xin-ming
    Chen Bing-chuan
    Lin Cheng-chuang
    2018 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, BIG DATA AND BLOCKCHAIN (ICCBB 2018), 2018, : 17 - 22
  • [33] Automated DDOS attack detection in software defined networking
    Ahuja, Nisha
    Singal, Gaurav
    Mukhopadhyay, Debajyoti
    Kumar, Neeraj
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 187 (187)
  • [34] DDoS Attack Detection Method Based on Machine Learning
    Liu, Cuilian
    Zhong, Sirong
    2024 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, ICSESS 2024, 2024, : 83 - 87
  • [35] DDoS Flood Attack Detection Based On Fractal Parameters
    Xia, Zhengmin
    Lu, Songnian
    Li, Jianhua
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [36] A Combined Harris Hawks and Dragonfly Optimization Approach for Feature Selection in MLP-Based DDoS Attack Detection
    Ghasem, J.
    Salah-hassa, R.
    Firouzjah, K. Gorgani
    INTERNATIONAL JOURNAL OF ENGINEERING, 2025, 38 (08): : 1898 - 1908
  • [37] Real Time Early Warning DDoS Attack Detection
    Xylogiannopoulos, Konstantinos
    Karampelas, Panagiotis
    Alhajj, Reda
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 344 - 351
  • [38] Cloud-based DDoS attack detection and defence system using statistical approach
    Devi B.S.K.
    Subbulakshmi T.
    International Journal of Information and Computer Security, 2019, 11 (4-5) : 447 - 475
  • [39] Detection of DDoS Attack in IoT Networks Using Sample Selected RNN-ELM
    Hariprasad, S.
    Deepa, T.
    Bharathiraja, N.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03) : 1425 - 1440
  • [40] LSTM-Based Collaborative Source-Side DDoS Attack Detection
    Yeom, Sungwoong
    Choi, Chulwoong
    Kim, Kyungbaek
    IEEE ACCESS, 2022, 10 : 44033 - 44045