DDOS attacks detection based on attention-deep learning and local outlier factor

被引:2
作者
Dairi, Abdelkader [1 ]
Khaldi, Belkacem [2 ]
Harrou, Fouzi [3 ]
Sun, Ying [3 ]
机构
[1] Univ Sci & Technol Mohamed Boudiaf Oran, Comp Sci Dept, Bir El Djir, Algeria
[2] Ecole Superieure Informat, Sidi Bel Abbes, Algeria
[3] King Abdullah Univ Sci & Technol, CEMSE Div, Thuwal, Saudi Arabia
来源
2022 SEVENTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC | 2022年
关键词
Cybersecurity; Distributed Denial of Service; autoencoder; self-attention; recurrent neural network;
D O I
10.1109/FMEC57183.2022.10062705
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most significant security concerns confronting network technology is the detection of distributed denial of service (DDOS). This paper introduces a semi-supervised datadriven approach to the detection of DDOS attacks. The proposed method employs normal events data without labeling to train the detection model. Specifically, this approach introduces an improved autoencoder (AE) model by incorporating a Gated Recurrent Unit (GRU) based on the attention mechanism (AM) at the encoder and decoder sides of the AE model. GRU enhances the AE's ability to learn temporal dependencies, and the AM enables the selection of relevant features. For DDOS attacks detection, the local outlier factor (LOF) anomaly detection algorithm is applied to extracted features from the improved AE model. The performance of the proposed approach has been verified using DDOS publically available datasets.
引用
收藏
页码:125 / 128
页数:4
相关论文
共 20 条
[1]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[2]   DDOS-attacks detection using an efficient measurement-based statistical mechanism [J].
Bouyeddou, Benamar ;
Kadri, Benamar ;
Harrou, Fouzi ;
Sun, Ying .
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2020, 23 (04) :870-878
[3]  
Bouyeddou B, 2018, 2018 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND TECHNOLOGY APPLICATIONS (ICCTA), P11, DOI 10.1109/CATA.2018.8398647
[4]   LOF: Identifying density-based local outliers [J].
Breunig, MM ;
Kriegel, HP ;
Ng, RT ;
Sander, J .
SIGMOD RECORD, 2000, 29 (02) :93-104
[5]  
Chen F, 2018, PROCEEDINGS OF THE 2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), P68, DOI 10.1109/IDAACS-SWS.2018.8525522
[6]   DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges [J].
Eliyan, Lubna Fayez ;
Di Pietro, Roberto .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 122 (122) :149-171
[7]   An Investigation into the Application of Deep Learning in the Detection and Mitigation of DDOS Attack on SDN Controllers [J].
Gadze, James Dzisi ;
Bamfo-Asante, Akua Acheampomaa ;
Agyemang, Justice Owusu ;
Nunoo-Mensah, Henry ;
Opare, Kwasi Adu-Boahen .
TECHNOLOGIES, 2021, 9 (01)
[8]  
Harrou F., 2020, STAT PROCESS MONITOR
[9]   Malicious Attacks Detection in Crowded Areas Using Deep Learning-Based Approach [J].
Harrou, Fouzi ;
Hittawe, Mohamad Mazen ;
Sun, Ying ;
Beya, Ouadi .
IEEE INSTRUMENTATION & MEASUREMENT MAGAZINE, 2020, 23 (05) :57-62
[10]   A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection [J].
Khan, Farrukh Aslam ;
Gumaei, Abdu ;
Derhab, Abdelouahid ;
Hussain, Amir .
IEEE ACCESS, 2019, 7 :30373-30385