Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol

被引:8
作者
Zolotukhin, Mikhail [1 ]
Hamalainen, Timo [1 ]
Kokkonen, Tero [2 ]
Niemela, Antti [2 ]
Siltanen, Jarmo [2 ]
机构
[1] Univ Jyvaskyla, Dept Math Informat Technol, Jyvaskyla, Finland
[2] JAMK Univ Appl Sci, Jyvaskyla, Finland
来源
INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS | 2015年 / 9247卷
关键词
Network security; Intrusion detection; DoS attack; Data mining; Anomaly detection;
D O I
10.1007/978-3-319-23126-6_25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose an algorithm for detection of Denial of Service attacks that utilize SSL/TLS protocol. These protocols encrypt the data of network connections on the application layer which makes it impossible to detect attackers activity based on the analysis of packet payload. For this reason, we concentrate on statistics that can be extracted from packet headers. Based on these statistics, we build a model of normal user behavior by using several data mining algorithms. Once the model has been built, it is used to detect DoS attacks. The proposed framework is tested on the data obtained with the help of a realistic cyber environment that enables one to construct real attack vectors. The simulations show that the proposed method results in a higher accuracy rate when compared to other intrusion detection techniques.
引用
收藏
页码:274 / 285
页数:12
相关论文
共 24 条
[1]  
[Anonymous], LIBPC FIL FORM
[2]  
[Anonymous], SEC TECHN ICCST 2014
[3]   Detection of Application Layer DDoS Attacks with Clustering and Bayes Factors [J].
Chwalinski, Pawel ;
Belavkin, Roman ;
Cheng, Xiaochun .
2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, :156-161
[4]  
Corona I, 2010, JMLR WORKSH CONF PRO, V11, P160
[5]  
Dierks T., 2006, 4346 IETF RFC
[6]  
Durcekova V., 2012, 2012 Proceedings of the 9th Conference of ELEKTRO (ELEKTRO 2012), P55, DOI 10.1109/ELEKTRO.2012.6225571
[7]  
Ester M., 1996, DENSITY BASED ALGORI, DOI DOI 10.5555/3001460.3001507
[8]  
Gu Q., 2008, HDB COMPUTER NETWORK, V3
[9]  
Jie Zhang, 2010, 2010 International Conference on Information, Networking and Automation (ICINA 2010), P67, DOI 10.1109/ICINA.2010.5636786
[10]  
Johnson A.R., 1998, Applied multivariate statistical analysis