Application Layer DDoS Attack Detection Using Cuckoo Search Algorithm-Trained Radial Basis Function

被引:15
作者
Beitollahi, Hakem [1 ]
Sharif, Dyari Mohammad [2 ]
Fazeli, Mahdi [3 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Tehran 1684613114, Iran
[2] Soran Univ, Comp Sci Dept, Soran 44008, Kurdistan Regio, Iraq
[3] Halmstad Univ, Sch Informat Technol, S-30118 Halmstad, Sweden
关键词
Servers; Feature extraction; Genetic algorithms; Denial-of-service attack; Support vector machines; Computer crime; Load modeling; Application layer DDoS; machine learning; radial basis function; cuckoo search algorithm; genetic algorithm;
D O I
10.1109/ACCESS.2022.3182818
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an application-layer distributed denial of service (App-DDoS) attack, zombie computers bring down the victim server with valid requests. Intrusion detection systems (IDS) cannot identify these requests since they have legal forms of standard TCP connections. Researchers have suggested several techniques for detecting App-DDoS traffic. There is, however, no clear distinction between legitimate and attack traffic. In this paper, we go a step further and propose a Machine Learning (ML) solution by combining the Radial Basis Function (RBF) neural network with the cuckoo search algorithm to detect App-DDoS traffic. We begin by collecting training data and cleaning them, then applying data normalizing and finding an optimal subset of features using the Genetic Algorithm (GA). Next, an RBF neural network is trained by the optimal subset of features and the optimizer algorithm of cuckoo search. Finally, we compare our proposed technique to the well-known k-nearest neighbor (k-NN), Bootstrap Aggregation (Bagging), Support Vector Machine (SVM), Multi-layer Perceptron) MLP, and (Recurrent Neural Network) RNN methods. Our technique outperforms previous standard and well-known ML techniques as it has the lowest error rate according to error metrics. Moreover, according to standard performance metrics, the results of the experiments demonstrate that our proposed technique detects App-DDoS traffic more accurately than previous techniques.
引用
收藏
页码:63844 / 63854
页数:11
相关论文
共 25 条
  • [1] Alam MJ, 2011, LECT NOTES ARTIF INT, V7015, P246, DOI 10.1007/978-3-642-25020-0_32
  • [2] Efficient Detection of DDoS Attacks Using a Hybrid Deep Learning Model with Improved Feature Selection
    Alghazzawi, Daniyal
    Bamasag, Omaimah
    Ullah, Hayat
    Asghar, Muhammad Zubair
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (24):
  • [3] Banerjee S, 2021, 2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), P966, DOI 10.1109/ICCCIS51004.2021.9397068
  • [4] ConnectionScore: a statistical technique to resist application-layer DDoS attacks
    Beitollahi, Hakem
    Deconinck, Geert
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2014, 5 (03) : 425 - 442
  • [5] A Four-Step Technique for Tackling DDoS Attacks
    Beitollahi, Hakem
    Deconinck, Geert
    [J]. ANT 2012 AND MOBIWIS 2012, 2012, 10 : 507 - 516
  • [6] A conceptual comparison of the Cuckoo-search, particle swarm optimization, differential evolution and artificial bee colony algorithms
    Civicioglu, Pinar
    Besdok, Erkan
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2013, 39 (04) : 315 - 346
  • [7] Dash M., 1997, Intelligent Data Analysis, V1
  • [8] Application-Layer DDoS Defense with Reinforcement Learning
    Feng, Yebo
    Li, Jun
    Thanh Nguyen
    [J]. 2020 IEEE/ACM 28TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2020,
  • [9] Robustness of text-based completely automated public turing test to tell computers and humans apart
    Gao, Haichang
    Wang, Xuqin
    Cao, Fang
    Zhang, Zhengya
    Lei, Lei
    Qi, Jiao
    Liu, Xiyang
    [J]. IET INFORMATION SECURITY, 2016, 10 (01) : 45 - 52
  • [10] Ismail M. I., 2022, IEEE ACCESS, V10, P21443