Anomaly Detection for DDoS Attacks via Behavior Profiles Deviation Degree

被引:0
|
作者
Liu, Yun
Jiang, Siyu
Huang, Jiuming
机构
关键词
anomaly detection; behavior profile; TCM-KNN algorithm;
D O I
10.4028/www.scientific.net/AMM.263-266.3145
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Distributed Denial-of-Service (DDoS) attacks present a very serious threat to the stability of the Internet. In this paper, an anomaly detection method for DDoS attacks via Behavior Profiles Deviation Degree (BPDD) is proposed. First, the behavior, profiles of normal traffic and real-time traffic are constructed using Markov Chain respectively, and then BPDD is designed to measure the discrepancy of the two profiles. Furthermore, TCM-KNN (Transductive Confidence Machines for K-Nearest Neighbors) algorithm is applied to identify attacks by classifying the BPDD samples. The experimental results demonstrate that the proposed method can effectively distinguish normal traffic from DDoS attacks, and has higher detection ratio and lower false alarm ratio than traditional detection methods.
引用
收藏
页码:3145 / 3150
页数:6
相关论文
共 50 条
  • [21] A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs
    El Sayed, Mahmoud Said
    Le-Khac, Nhien-An
    Azer, Marianne A.
    Jurcut, Anca D.
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (04) : 1862 - 1880
  • [22] Detection of DDOS Attacks in Cloud Computing Environment
    Hamdani, Farhaan Noor
    Siddiqui, Farheen
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 83 - 87
  • [23] Relevance of the Gaussian classification on the Detection of DDoS Attacks
    Tapsoba, Abdou Romaric
    Ouedraogo, Tounwendyam Frederic
    Ouedraogo, Arnold Elvis
    2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 42 - 49
  • [24] Efficient Detection of DDoS Attacks with Important Attributes
    Wang, Wei
    Gombault, Sylvain
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 61 - +
  • [25] Detection And Countermeasures of DDoS Attacks in Cloud Computing
    Elsayed, Mahmoud Said
    Azer, Marianne A.
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 702 - 707
  • [26] Detection of Sources Being Used in DDoS Attacks
    Khosroshahi, Yalda
    Ozdemir, Enver
    2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, : 163 - 168
  • [27] Hybrid Intrusion Detection System for DDoS Attacks
    Cepheli, Ozge
    Buyukcorak, Saliha
    Kurt, Gunes Karabulut
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016
  • [28] Traffic Anomaly Detection in DDos Flooding Attack
    Purwanto, Yudha
    Hendrawan, Kuspriyanto
    Rahardjo, Budi
    2014 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2014,
  • [29] DDoS Attacks Detection by Means of Statistical Models
    Andrysiak, Tomasz
    Saganowski, Lukasz
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON COMPUTER RECOGNITION SYSTEMS, CORES 2015, 2016, 403 : 797 - 806
  • [30] Web DDoS Detection Schemes Based on Measuring User's Access Behavior with Large Deviation
    Wang, Jin
    Yang, Xiaolong
    Long, Keping
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,