A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence

被引:19
作者
Cheng, Jieren [1 ,2 ]
Zhou, Jinghe [1 ]
Liu, Qiang [3 ]
Tang, Xiangyan [1 ]
Guo, Yanxiang [4 ,5 ]
机构
[1] Hainan Univ, Sch Informat Sci & Technol, Haikou 570228, Hainan, Peoples R China
[2] State Key Lab Marine Resource Utilizat South Chin, Haikou 570228, Hainan, Peoples R China
[3] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[4] Chinese Acad Sci, Shenzhen Inst Adv Technol, Shenzhen 518055, Peoples R China
[5] Chinese Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
socially aware networking; DDoS; ARIMA modeling; multi-feature fusion; error correction; ATTACKS; SYSTEM;
D O I
10.1093/comjnl/bxy025
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial-of-Service (DDoS) is one of the most destructive network attacks. In Socially Aware Networking (SAN), there are many problems in current detection methods, such as low flexibility in detecting different attacks, high false-negative and false-positive rates. In this paper, we propose a DDoS detection method for SAN based on fusion feature series forecasting. Specifically, we define a multi-protocol-fusion feature (MPFF) to characterize normal network flows. Moreover, we utilize the time-series Autoregressive Integrated Moving Average Model (ARIMA) to formally describe the MPFF sequence, which is subsequently used in network flow forecasting and error calculation. Finally, we present the ARIMA detection model with error correction based on MPFF time series to identify DDoS in SAN. The experimental results show that the proposed method can effectively distinguish attacking flows from normal ones. Compared with previous DDoS detection methods for SAN, the proposed method can achieve better performance of detecting DDoS in terms of detection rate, false-positive rate and time delay.
引用
收藏
页码:959 / 970
页数:12
相关论文
共 36 条
[1]   ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network [J].
Amine Ferrag, Mohamed ;
Ahmim, Ahmed .
TELECOMMUNICATION SYSTEMS, 2017, 66 (03) :481-503
[2]  
Andrysiak Tomasz, 2015, Image processing & Communication, V20, P23, DOI 10.1515/ipc-2015-0027
[3]  
[Anonymous], DARPA INTR DET SCEN
[4]  
[Anonymous], IEEE INTERNET THINGS, DOI DOI 10.1109/JIOT.2017.2764259
[5]  
[Anonymous], 2017, SHOCK VIBRATION
[6]  
[Anonymous], SOFT COMPUT
[7]   The great time series classification bake off: a review and experimental evaluation of recent algorithmic advances [J].
Bagnall, Anthony ;
Lines, Jason ;
Bostrom, Aaron ;
Large, James ;
Keogh, Eamonn .
DATA MINING AND KNOWLEDGE DISCOVERY, 2017, 31 (03) :606-660
[8]   A Distributed TCAM Coprocessor Architecture for Integrated Longest Prefix Matching, Policy Filtering, and Content Filtering [J].
Cai, Zhiping ;
Wang, Zhijun ;
Zheng, Kai ;
Cao, Jiannong .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (03) :417-427
[9]  
CAIDAIS] The CAIDA UCSD, 2015, CAIDA DDOS ATTACK 20
[10]   DDoS Attack Detection using Fast Entropy Approach on Flow-Based Network Traffic [J].
David, Jisa ;
Thomas, Ciza .
BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 :30-36