Anomaly Detection for DDoS Attacks via Behavior Profiles Deviation Degree

被引:0
|
作者
Liu, Yun
Jiang, Siyu
Huang, Jiuming
机构
关键词
anomaly detection; behavior profile; TCM-KNN algorithm;
D O I
10.4028/www.scientific.net/AMM.263-266.3145
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Distributed Denial-of-Service (DDoS) attacks present a very serious threat to the stability of the Internet. In this paper, an anomaly detection method for DDoS attacks via Behavior Profiles Deviation Degree (BPDD) is proposed. First, the behavior, profiles of normal traffic and real-time traffic are constructed using Markov Chain respectively, and then BPDD is designed to measure the discrepancy of the two profiles. Furthermore, TCM-KNN (Transductive Confidence Machines for K-Nearest Neighbors) algorithm is applied to identify attacks by classifying the BPDD samples. The experimental results demonstrate that the proposed method can effectively distinguish normal traffic from DDoS attacks, and has higher detection ratio and lower false alarm ratio than traditional detection methods.
引用
收藏
页码:3145 / 3150
页数:6
相关论文
共 50 条
  • [31] Deep Anomaly Detection with Deviation Networks
    Pang, Guansong
    Shen, Chunhua
    van den Hengel, Anton
    KDD'19: PROCEEDINGS OF THE 25TH ACM SIGKDD INTERNATIONAL CONFERENCCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2019, : 353 - 362
  • [32] An Adversary-Centric Behavior Modeling of DDoS Attacks
    Wang, An
    Mohaisen, Aziz
    Chen, Songqing
    2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, : 1126 - 1136
  • [33] Detection of DDoS Attacks via an Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm
    Akyazi, Ugur
    Uyar, A. Sima
    APPLICATIONS OF EVOLUTIONARY COMPUTATION, PT II, PROCEEDINGS, 2010, 6025 : 1 - +
  • [34] Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks
    Abusnaina, Ahmed
    Abuhamad, Mohammed
    Nyang, DaeHun
    Chen, Songqing
    Wang, An
    Mohaisen, David
    INFORMATION SECURITY APPLICATIONS, WISA 2020, 2020, 12583 : 362 - 374
  • [35] Detection of DDoS attacks using optimized traffic matrix
    Lee, Sang Min
    Kim, Dong Seong
    Lee, Je Hak
    Park, Jong Sou
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (02) : 501 - 510
  • [36] Timely detection of DDoS attacks in IoT with dimensionality reduction
    Kumari, Pooja
    Jain, Ankit Kumar
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7869 - 7887
  • [37] Regression algorithms for efficient detection and prediction of DDoS attacks
    Dayanandam, Gudipudi.
    Reddy, E. Srinivasa
    Babu, Dasari. Bujji
    PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2017, : 215 - 219
  • [38] Detection of DoS/DDoS attacks: the UBM and GMM approach
    Martinez Osorio, Jorge Steven
    Vergara Tejada, Jaime Alberto
    Botero Vega, Juan Felipe
    2021 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2021), 2021, : 866 - 871
  • [39] Analysis and Detection of DDoS Attacks Targetting Virtualized Servers
    Ahmed, Nisar
    Sadhayo, Intesab Hussain
    Yousif, Zahid
    Naeem, Nadeem
    Parveen, Sajida
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (01): : 128 - 133
  • [40] Detection DDOS Attacks Using Machine Learning Methods
    Aytac, Tugba
    Aydin, Muhammed Ali
    Zaim, Abdul Halim
    ELECTRICA, 2020, 20 (02): : 159 - 167