Skip to main content
Erschienen in: The Journal of Supercomputing 6/2022

07.01.2022

A hybrid machine learning approach for detecting unprecedented DDoS attacks

verfasst von: Mohammad Najafimehr, Sajjad Zarifzadeh, Seyedakbar Mostafavi

Erschienen in: The Journal of Supercomputing | Ausgabe 6/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Service availability plays a vital role on computer networks, against which Distributed Denial of Service (DDoS) attacks are an increasingly growing threat each year. Machine learning (ML) is a promising approach widely used for DDoS detection, which obtains satisfactory results for pre-known attacks. However, they are almost incapable of detecting unknown malicious traffic. This paper proposes a novel method combining both supervised and unsupervised algorithms. First, a clustering algorithm separates the anomalous traffic from the normal data using several flow-based features. Then, using certain statistical measures, a classification algorithm is used to label the clusters. Employing a big data processing framework, we evaluate the proposed method by training on the CICIDS2017 dataset and testing on a different set of attacks provided in the more up-to-date CICDDoS2019. The results demonstrate that the Positive Likelihood Ratio (LR+) of our method is approximately 198% higher than the ML classification algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Fußnoten
1
From 217 Gbps in Sep. 2019 to 937 Gbps in Sep. 2020.
 
2
Each point here indicates a network flow in the raw dataset.
 
3
We used the features provided in the evaluation dataset, shown in Table 2 and described in Sect. 5.
 
4
Due to the positiveness of the distance values; the value of the min, max, mean, and std of them are indeed positive.
 
5
The proposed method that uses RF in phase 2 and \( np=20 \).
 
Literatur
7.
12.
Zurück zum Zitat Chen J, Yang Yt, Hu Kk, Zheng Hb, Wang Z (2019) DAD-MCNN: DDoS attack detection via multi-channel CNN. In: Proceedings of the 2019 11th International Conference on Machine Learning and Computing, ICMLC ’19, p. 484-488. Association for Computing Machinery, Zhuhai, China (2019). https://doi.org/10.1145/3318299.3318329 Chen J, Yang Yt, Hu Kk, Zheng Hb, Wang Z (2019) DAD-MCNN: DDoS attack detection via multi-channel CNN. In: Proceedings of the 2019 11th International Conference on Machine Learning and Computing, ICMLC ’19, p. 484-488. Association for Computing Machinery, Zhuhai, China (2019). https://​doi.​org/​10.​1145/​3318299.​3318329
13.
Zurück zum Zitat Deepa V, Sudar KM, Deepalakshmi P (2018) Detection of DDoS attack on SDN control plane using hybrid machine learning techniques. In: 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 299–303. IEEE, Tirunelveli, India (2018). https://doi.org/10.1109/ICSSIT.2018.8748836 Deepa V, Sudar KM, Deepalakshmi P (2018) Detection of DDoS attack on SDN control plane using hybrid machine learning techniques. In: 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 299–303. IEEE, Tirunelveli, India (2018). https://​doi.​org/​10.​1109/​ICSSIT.​2018.​8748836
15.
Zurück zum Zitat Draper-Gil G, Lashkari AH, Mamun MSI, A Ghorbani A (2016) Characterization of encrypted and vpn traffic using time-related features. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy - ICISSP,, pp. 407–414. INSTICC, SciTePress (2016). https://doi.org/10.5220/0005740704070414 Draper-Gil G, Lashkari AH, Mamun MSI, A Ghorbani A (2016) Characterization of encrypted and vpn traffic using time-related features. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy - ICISSP,, pp. 407–414. INSTICC, SciTePress (2016). https://​doi.​org/​10.​5220/​0005740704070414​
16.
Zurück zum Zitat Elbatta MT, Ashour WM (2013) A dynamic method for discovering density varied clusters. Int J Signal Process Image Process Pattern Recognit 6(1):123–134 Elbatta MT, Ashour WM (2013) A dynamic method for discovering density varied clusters. Int J Signal Process Image Process Pattern Recognit 6(1):123–134
17.
Zurück zum Zitat Ester M, Kriegel HP, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, KDD’96, p. 226-231. AAAI Press (1996) Ester M, Kriegel HP, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, KDD’96, p. 226-231. AAAI Press (1996)
20.
Zurück zum Zitat Habibi Lashkari A, Draper Gil G, Mamun MSI, Ghorbani AA (2017) Characterization of tor traffic using time based features. In: Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP,, pp. 253–262. INSTICC, SciTePress (2017). https://doi.org/10.5220/0006105602530262 Habibi Lashkari A, Draper Gil G, Mamun MSI, Ghorbani AA (2017) Characterization of tor traffic using time based features. In: Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP,, pp. 253–262. INSTICC, SciTePress (2017). https://​doi.​org/​10.​5220/​0006105602530262​
31.
Zurück zum Zitat Li J, Liu M, Xue Z, Fan X, He X (2020) RTVD: a real-time volumetric detection scheme for ddos in the internet of things. IEEE Access 8:36191–36201CrossRef Li J, Liu M, Xue Z, Fan X, He X (2020) RTVD: a real-time volumetric detection scheme for ddos in the internet of things. IEEE Access 8:36191–36201CrossRef
35.
Zurück zum Zitat Meng X, Bradley J, Yavuz B, Sparks E, Venkataraman S, Liu D, Freeman J, Tsai D, Amde M, Owen S, Xin D, Xin R, Franklin MJ, Zadeh R, Zaharia M, Talwalkar A (2016) Mllib: machine learning in apache spark. J Mach Learn Res 17(1):1235–1241MathSciNetMATH Meng X, Bradley J, Yavuz B, Sparks E, Venkataraman S, Liu D, Freeman J, Tsai D, Amde M, Owen S, Xin D, Xin R, Franklin MJ, Zadeh R, Zaharia M, Talwalkar A (2016) Mllib: machine learning in apache spark. J Mach Learn Res 17(1):1235–1241MathSciNetMATH
38.
Zurück zum Zitat Moustafa N, Slay J (2015) Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp. 1–6. IEEE, Canberra, ACT, Australia (2015). https://doi.org/10.1109/MilCIS.2015.7348942 Moustafa N, Slay J (2015) Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp. 1–6. IEEE, Canberra, ACT, Australia (2015). https://​doi.​org/​10.​1109/​MilCIS.​2015.​7348942
39.
Zurück zum Zitat Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825–2830MathSciNetMATH Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825–2830MathSciNetMATH
44.
Zurück zum Zitat Roempluk T, Surinta O (2019) A machine learning approach for detecting distributed denial of service attacks. In: 2019 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT-NCON), pp. 146–149. Nan, Thailand (2019). https://doi.org/10.1109/ECTI-NCON.2019.8692243 Roempluk T, Surinta O (2019) A machine learning approach for detecting distributed denial of service attacks. In: 2019 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT-NCON), pp. 146–149. Nan, Thailand (2019). https://​doi.​org/​10.​1109/​ECTI-NCON.​2019.​8692243
46.
Zurück zum Zitat Rosenberg A, Hirschberg J (2007) V-measure: A conditional entropy-based external cluster evaluation measure. In: Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL), pp. 410–420. Association for Computational Linguistics, Prague, Czech Republic (2007). https://www.aclweb.org/anthology/D07-1043 Rosenberg A, Hirschberg J (2007) V-measure: A conditional entropy-based external cluster evaluation measure. In: Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL), pp. 410–420. Association for Computational Linguistics, Prague, Czech Republic (2007). https://​www.​aclweb.​org/​anthology/​D07-1043
49.
Zurück zum Zitat Sharafaldin I, Habibi Lashkari A, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy, pp. 108–116. Funchal, Madeira, Portugal (2018). https://doi.org/10.5220/0006639801080116 Sharafaldin I, Habibi Lashkari A, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy, pp. 108–116. Funchal, Madeira, Portugal (2018). https://​doi.​org/​10.​5220/​0006639801080116​
50.
Zurück zum Zitat Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1–8. Chennai, India (2019). https://doi.org/10.1109/CCST.2019.8888419 Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1–8. Chennai, India (2019). https://​doi.​org/​10.​1109/​CCST.​2019.​8888419
56.
Zurück zum Zitat Wani AR, Rana QP, Saxena U, Pandey N (2019) Analysis and detection of DDoS attacks on cloud computing environment using machine learning techniques. In: 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 870–875. Dubai, United Arab Emirates (2019). https://doi.org/10.1109/AICAI.2019.8701238 Wani AR, Rana QP, Saxena U, Pandey N (2019) Analysis and detection of DDoS attacks on cloud computing environment using machine learning techniques. In: 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 870–875. Dubai, United Arab Emirates (2019). https://​doi.​org/​10.​1109/​AICAI.​2019.​8701238
59.
Zurück zum Zitat Zaharia M, Xin RS, Wendell P, Das T, Armbrust M, Dave A, Meng X, Rosen J, Venkataraman S, Franklin MJ, Ghodsi A, Gonzalez J, Shenker S, Stoica I (2016) Apache spark: a unified engine for big data processing. Commun ACM 59(11):56–65. https://doi.org/10.1145/2934664CrossRef Zaharia M, Xin RS, Wendell P, Das T, Armbrust M, Dave A, Meng X, Rosen J, Venkataraman S, Franklin MJ, Ghodsi A, Gonzalez J, Shenker S, Stoica I (2016) Apache spark: a unified engine for big data processing. Commun ACM 59(11):56–65. https://​doi.​org/​10.​1145/​2934664CrossRef
60.
Zurück zum Zitat Zhou B, Li J, Wu J, Guo S, Gu Y, Li Z (2018) Machine-learning-based online distributed denial-of-service attack detection using spark streaming. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6. Kansas City, MO, USA (2018). https://doi.org/10.1109/ICC.2018.8422327 Zhou B, Li J, Wu J, Guo S, Gu Y, Li Z (2018) Machine-learning-based online distributed denial-of-service attack detection using spark streaming. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6. Kansas City, MO, USA (2018). https://​doi.​org/​10.​1109/​ICC.​2018.​8422327
Metadaten
Titel
A hybrid machine learning approach for detecting unprecedented DDoS attacks
verfasst von
Mohammad Najafimehr
Sajjad Zarifzadeh
Seyedakbar Mostafavi
Publikationsdatum
07.01.2022
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 6/2022
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-021-04253-x

Weitere Artikel der Ausgabe 6/2022

The Journal of Supercomputing 6/2022 Zur Ausgabe

Premium Partner