Distributed Denial of Service Attack Detection Using Machine Learning and Class Oversampling

被引:9
作者
Shafin, Sakib Shahriar [1 ]
Prottoy, Sakir Adnan [1 ]
Abbas, Saif [1 ]
Bin Hakim, Safayat [1 ]
Chowdhury, Abdullahi [2 ]
Rashid, Md Mamunur [3 ]
机构
[1] Islamic Univ Technol IUT, Gazipur, Bangladesh
[2] Federat Univ Australia, Ballarat, Vic, Australia
[3] Cent Queensland Univ, Rockhampton, Qld, Australia
来源
APPLIED INTELLIGENCE AND INFORMATICS, AII 2021 | 2021年 / 1435卷
关键词
Cyberattacks; DDoS attack; Machine learning;
D O I
10.1007/978-3-030-82269-9_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Distributed Denial of Services (DDoS) attack, one of the most dangerous types of cyber attack, has been reported to increase during the COVID-19 pandemic. Machine learning techniques have been proposed in the literature to build models to detect DDoS attacks. Existing works in literature tested their models with old datasets where DDoS attacks are not specific. These works mainly focus on detecting the presence of an attack rather than the type of DDoS attacks. However, detection of the attack type is vital for the review and analysis of enterprise-level security policy. Cyber-attacks are inherently an imbalanced data problem, but none of the models treated DDoS attack detection from this perspective. In this work, we present a machine learning model that takes the imbalance nature of the DDoS attack data into consideration for both presence/absence and the type of DDoS attack detection. Extensive experiment analysis with the recent and DDoS attack-specific dataset shows that the proposed technique can effectively identify DDoS attacks.
引用
收藏
页码:247 / 259
页数:13
相关论文
共 18 条
[1]  
[Anonymous], 1993, Series Title: Morgan Kaufmann series in {M}achine {L}earning Publication Title: Morgan Kaufmann San Mateo California
[2]  
[Anonymous], 1988, Parallel distributed processing1
[3]  
[Anonymous], KASPERSKY DDOS ATTAC
[4]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[5]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[6]   Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview [J].
Chowdhury, Abdullahi .
APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 :54-65
[7]  
Kachavimath Amit V., 2020, 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA). Proceedings, P711, DOI 10.1109/ICIMIA48430.2020.9074929
[8]   An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks [J].
Kasim, Omer .
COMPUTER NETWORKS, 2020, 180
[9]   Robust Malware Defense in Industrial IoT Applications Using Machine Learning With Selective Adversarial Samples [J].
Khoda, Mahbub E. ;
Imam, Tasadduq ;
Kamruzzaman, Joarder ;
Gondal, Iqbal ;
Rahman, Ashfaqur .
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2020, 56 (04) :4415-4424
[10]   Voting extreme learning machine based distributed denial of service attack detection in cloud computing [J].
Kushwah, Gopal Singh ;
Ranga, Virender .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53