Application-Layer DDoS Defense with Reinforcement Learning

被引:20
作者
Feng, Yebo [1 ]
Li, Jun [1 ]
Thanh Nguyen [1 ]
机构
[1] Univ Oregon, Dept Comp & Informat Sci, Eugene, OR 97403 USA
来源
2020 IEEE/ACM 28TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS) | 2020年
关键词
application-layer DDoS; distributed denial of service (DDoS); reinforcement learning; anomaly detection; ATTACKS;
D O I
10.1109/iwqos49365.2020.9213026
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Application-layer distributed denial-of-service (L7 DDoS) attacks, by exploiting application-layer requests to overwhelm functions or components of victim servers, have become a rising major threat to today's Internet. However, because the traffic from an L7 DDoS attack appears legitimate in transport and network layers, it is difficult for traditional DDoS solutions to detect and defend against an L7 DDoS attack. In this paper, we propose a new, reinforcement-learning-based approach to L7 DDoS attack defense. We introduce a multi-objective reward function to guide a reinforcement learning agent to learn the most suitable action in mitigating L7 DDoS attacks. Consequently, while actively monitoring and analyzing the victim server, the agent can apply different strategies under different conditions to protect the victim: When an L7 DDoS attack is overwhelming, the agent will aggressively mitigate as many malicious requests as possible, thereby keeping the victim server functioning (even at the cost of sacrificing a small number of legitimate requests); otherwise, the agent will conservatively mitigate malicious requests instead, with a focus on minimizing collateral damage to legitimate requests. The evaluation shows that our approach can achieve minimal collateral damage when the L7 DDoS attack is tolerable and mitigate 98.73% of the malicious application messages when the victim is brought to its knees.
引用
收藏
页数:10
相关论文
共 32 条
  • [1] [Anonymous], 2016, CoRR abs/1606.01540
  • [2] Anthony S., 2015, GITHUB BATTLES LARGE
  • [3] DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions
    Bawany, Narmeen Zakaria
    Shamsi, Jawwad A.
    Salah, Khaled
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) : 425 - 441
  • [4] Chollet F., 2015, KERAS
  • [5] Cloudflare, APPL LAYER DDOS ATT
  • [6] Histograms of oriented gradients for human detection
    Dalal, N
    Triggs, B
    [J]. 2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, : 886 - 893
  • [7] Gagniuc P. A., 2017, Markov Chains: From Theory to Implementation and Experimentation
  • [8] Howard R. A., 1960, Dynamic Programming and Markov Processes
  • [9] Reinforcement learning: A survey
    Kaelbling, LP
    Littman, ML
    Moore, AW
    [J]. JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 1996, 4 : 237 - 285
  • [10] Lantz B., 2010, P 9 ACM SIGCOMM WORK, P1