Application Layer DDoS Attack Detection Using Cuckoo Search Algorithm-Trained Radial Basis Function

被引:17
作者
Beitollahi, Hakem [1 ]
Sharif, Dyari Mohammad [2 ]
Fazeli, Mahdi [3 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Tehran 1684613114, Iran
[2] Soran Univ, Comp Sci Dept, Soran 44008, Kurdistan Regio, Iraq
[3] Halmstad Univ, Sch Informat Technol, S-30118 Halmstad, Sweden
关键词
Servers; Feature extraction; Genetic algorithms; Denial-of-service attack; Support vector machines; Computer crime; Load modeling; Application layer DDoS; machine learning; radial basis function; cuckoo search algorithm; genetic algorithm;
D O I
10.1109/ACCESS.2022.3182818
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an application-layer distributed denial of service (App-DDoS) attack, zombie computers bring down the victim server with valid requests. Intrusion detection systems (IDS) cannot identify these requests since they have legal forms of standard TCP connections. Researchers have suggested several techniques for detecting App-DDoS traffic. There is, however, no clear distinction between legitimate and attack traffic. In this paper, we go a step further and propose a Machine Learning (ML) solution by combining the Radial Basis Function (RBF) neural network with the cuckoo search algorithm to detect App-DDoS traffic. We begin by collecting training data and cleaning them, then applying data normalizing and finding an optimal subset of features using the Genetic Algorithm (GA). Next, an RBF neural network is trained by the optimal subset of features and the optimizer algorithm of cuckoo search. Finally, we compare our proposed technique to the well-known k-nearest neighbor (k-NN), Bootstrap Aggregation (Bagging), Support Vector Machine (SVM), Multi-layer Perceptron) MLP, and (Recurrent Neural Network) RNN methods. Our technique outperforms previous standard and well-known ML techniques as it has the lowest error rate according to error metrics. Moreover, according to standard performance metrics, the results of the experiments demonstrate that our proposed technique detects App-DDoS traffic more accurately than previous techniques.
引用
收藏
页码:63844 / 63854
页数:11
相关论文
共 25 条
[1]  
Alam MJ, 2011, LECT NOTES ARTIF INT, V7015, P246, DOI 10.1007/978-3-642-25020-0_32
[2]   Efficient Detection of DDoS Attacks Using a Hybrid Deep Learning Model with Improved Feature Selection [J].
Alghazzawi, Daniyal ;
Bamasag, Omaimah ;
Ullah, Hayat ;
Asghar, Muhammad Zubair .
APPLIED SCIENCES-BASEL, 2021, 11 (24)
[3]  
Banerjee S, 2021, 2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), P966, DOI 10.1109/ICCCIS51004.2021.9397068
[4]   ConnectionScore: a statistical technique to resist application-layer DDoS attacks [J].
Beitollahi, Hakem ;
Deconinck, Geert .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2014, 5 (03) :425-442
[5]   A Four-Step Technique for Tackling DDoS Attacks [J].
Beitollahi, Hakem ;
Deconinck, Geert .
ANT 2012 AND MOBIWIS 2012, 2012, 10 :507-516
[6]   A conceptual comparison of the Cuckoo-search, particle swarm optimization, differential evolution and artificial bee colony algorithms [J].
Civicioglu, Pinar ;
Besdok, Erkan .
ARTIFICIAL INTELLIGENCE REVIEW, 2013, 39 (04) :315-346
[7]  
Dash M., 1997, Intelligent Data Analysis, V1
[8]   Application-Layer DDoS Defense with Reinforcement Learning [J].
Feng, Yebo ;
Li, Jun ;
Thanh Nguyen .
2020 IEEE/ACM 28TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2020,
[9]   Robustness of text-based completely automated public turing test to tell computers and humans apart [J].
Gao, Haichang ;
Wang, Xuqin ;
Cao, Fang ;
Zhang, Zhengya ;
Lei, Lei ;
Qi, Jiao ;
Liu, Xiyang .
IET INFORMATION SECURITY, 2016, 10 (01) :45-52
[10]  
Ismail M. I., 2022, IEEE ACCESS, V10, P21443