Skip to main content

2015 | OriginalPaper | Buchkapitel

DDoS Detection Based on Second-Order Features and Machine Learning

verfasst von : Xiaowei He, Shuyuan Jin, Yunxue Yang, Huiqiang Chi

Erschienen in: Trustworthy Computing and Services

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, there appeared several new forms of DDoS attacks, such as DDoS using botnet, DNS Amplification attack and NTP Amplification attack, posing a great threat to network security and seriously affecting the stability and reliability of the network. Therefore, detecting the DDoS attacks accurately and timely has positive significance to mitigate DDoS attacks as soon as possible and reduce the impact of DDoS attacks. Previously, most of the researchers focused on extracting features of traffic and finding effective approaches to detect DDoS attack, while ignoring the correlativity between features. This paper applies second-order features to machine learning algorithms in order to study the correlativity between features and use sliding window mechanism to improve the model. We use KDD CUP 99 dataset for evaluating the methods. The evaluation results show that the correlativity between features can accurately differentiate DDoS attacks from normal traffic.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yeung, D.S., Jin, S.: Covariance matrix modeling and detecting various flooding attacks. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 13, 222–232 (2007) Yeung, D.S., Jin, S.: Covariance matrix modeling and detecting various flooding attacks. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 13, 222–232 (2007)
2.
Zurück zum Zitat Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 222–232 (1987)CrossRef Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 222–232 (1987)CrossRef
3.
Zurück zum Zitat García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009). ISSN: 0167-4048 CrossRef García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009). ISSN: 0167-4048 CrossRef
4.
Zurück zum Zitat Tan, X., Xi, H.: Hidden semi-markov model for anomaly detection. Appl. Math. Comput. 205(2), 562–567 (2008). ISSN: 0096-3003MATHMathSciNetCrossRef Tan, X., Xi, H.: Hidden semi-markov model for anomaly detection. Appl. Math. Comput. 205(2), 562–567 (2008). ISSN: 0096-3003MATHMathSciNetCrossRef
5.
Zurück zum Zitat Vijayasarathy, R., Raghavan, S.V., Ravindran, B.: A system approach to network modeling for DDoS detection using a Naïve Bayesian classifier. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1–10, 4–8 January 2011 Vijayasarathy, R., Raghavan, S.V., Ravindran, B.: A system approach to network modeling for DDoS detection using a Naïve Bayesian classifier. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1–10, 4–8 January 2011
6.
Zurück zum Zitat Reif, M., Goldstein, M., Stahl, A., Breuel, T.M.: Anomaly detection by combining decision trees and parametric densities. In: 2008 19th International Conference on Pattern Recognition, ICPR 2008, pp. 1–4, 8–11 December 2008 Reif, M., Goldstein, M., Stahl, A., Breuel, T.M.: Anomaly detection by combining decision trees and parametric densities. In: 2008 19th International Conference on Pattern Recognition, ICPR 2008, pp. 1–4, 8–11 December 2008
7.
Zurück zum Zitat Ndong, J., Salamatian, K.: A robust anomaly detection technique using combined statistical methods. In: Proceedings of the 2011 Ninth Annual Communication Networks and Services Research Conference (CNSR 2011). IEEE Computer Society, Washington, pp. 101–108 Ndong, J., Salamatian, K.: A robust anomaly detection technique using combined statistical methods. In: Proceedings of the 2011 Ninth Annual Communication Networks and Services Research Conference (CNSR 2011). IEEE Computer Society, Washington, pp. 101–108
8.
Zurück zum Zitat Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. 24(4), 295–307 (2005)CrossRef Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. 24(4), 295–307 (2005)CrossRef
Metadaten
Titel
DDoS Detection Based on Second-Order Features and Machine Learning
verfasst von
Xiaowei He
Shuyuan Jin
Yunxue Yang
Huiqiang Chi
Copyright-Jahr
2015
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-47401-3_26