Distributed denial of service attack detection using autoencoder and deep neural networks

被引:38
作者
Catak, Ferhat Ozgur [1 ]
Mustacoglu, Ahmet Fatih [2 ]
机构
[1] TUBITAK BILGEM Cyber Secur Inst, TR-41400 Kocaeli, Turkey
[2] Istanbul Sehir Univ, Cyber Secur Engn, Istanbul, Turkey
关键词
cyber security; ddos; deep learning; autoencoder; ANOMALY DETECTION; SYSTEM;
D O I
10.3233/JIFS-190159
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today, many companies are faced with the huge network traffics mainly consisting of the various type of network attacks due to the increased usage of the botnet, fuzzier, shellcode or network related vulnerabilities. These types of attacks are having a negative impact on the organization because they block the day-to-day operations. By using the classification models, the attacks could be identified and separated earlier. The Distributed Denial of Service Attacks (DDoS) primarily focus on preventing or reducing the availability of a service to innocent users. In this research, we focused primarily on the classification of network traffics based on the deep learning methods and technologies for network flow models. In order to increase the classification performance of a model that is based on the deep neural networks has been used. The model used in this research for the classification of network traffics evaluated and the related metrics showing the classification performance have been depicted in the figures and tables. As the results indicate, the proposed model can perform well enough for detecting DDoS attacks through deep learning technologies.
引用
收藏
页码:3969 / 3979
页数:11
相关论文
共 25 条
[1]   Effects of cyber security knowledge on attack detection [J].
Ben-Asher, Noam ;
Gonzalez, Cleotilde .
COMPUTERS IN HUMAN BEHAVIOR, 2015, 48 :51-61
[2]  
Bhatia S, 2016, PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), P958, DOI 10.1109/FTC.2016.7821720
[3]  
Bhuyan M.H., 2015, PATTERN RECOGNITION, V51
[4]   A practical approach to detection of distributed denial-of-service attacks using a hybrid detection method [J].
Bojovic, P. D. ;
Basicevic, I. ;
Ocovaj, S. ;
Popovic, M. .
COMPUTERS & ELECTRICAL ENGINEERING, 2019, 73 :84-96
[5]  
Cappers B.C.M., 2015, VIS CYB SEC VIZSEC 2, P1, DOI DOI 10.1109/VIZSEC.2015.7312768
[6]  
Catak F.O., 2017, 5 HIGH PERF COMP C, P1
[7]  
Deshpande P, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), P632, DOI 10.1109/CCAA.2015.7148450
[8]   Distributed attack detection scheme using deep learning approach for Internet of Things [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :761-768
[9]   Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (02) :169-175
[10]  
Feinstein L, 2003, DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, P303, DOI 10.1109/DISCEX.2003.1194894