Implementation of a Clustering-Based LDDoS Detection Method

被引:2
|
作者
Hussain, Tariq [1 ]
Saeed, Muhammad Irfan [2 ]
Khan, Irfan Ullah [3 ]
Aslam, Nida [4 ]
Aljameel, Sumayh S. [3 ]
机构
[1] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou 310018, Peoples R China
[2] Northeastern Univ, Software Coll, Shenyang 110819, Peoples R China
[3] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
[4] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Saudi Aramco Cybersecur Chair, POB 1982, Dammam 31441, Saudi Arabia
关键词
low-rate distributed DoS (LDDoS) attacks; attacks detection; two-step clustering; outliers detection; ATTACKS;
D O I
10.3390/electronics11182804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid advancement and transformation of technology, information and communication technologies (ICT), in particular, have attracted everyone's attention. The attackers took advantage of this and can caused serious problems, such as malware attack, ransomware, SQL injection attack, etc. One of the dominant attacks, known as distributed denial-of-service (DDoS), has been observed as the main reason for information hacking. In this paper, we have proposed a secure technique, called the low-rate distributed denial-of-service (LDDoS) technique, to measure attack penetration and secure communication flow. A two-step clustering method was adopted, where the network traffic was controlled by using the characteristics of TCP traffic with discrete sense; then, the suspicious cluster with the abnormal analysis was detected. This method has proven to be reliable and efficient for LDDoS attacks detection, based on the NS-2 simulator, compared to the exponentially weighted moving average (EWMA) technique, which has comparatively very high false-positive rates. Analyzing abnormal test pieces helps us reduce the false positives. The proposed methodology was implemented using Python for scripting and NS-2 simulator for topology, two public trademark datasets, i.e., Web of Information for Development (WIDE) and Lawrence Berkley National Laboratory (LBNL), were selected for experiments. The experiments were analyzed, and the results evaluated using Wireshark. The proposed LDDoS approach achieved good results, compared to the previous techniques.
引用
收藏
页数:17
相关论文
共 50 条
  • [11] An incremental nonparametric Bayesian clustering-based traversable region detection method
    Lee, Honggu
    Kwak, Kiho
    Jo, Sungho
    AUTONOMOUS ROBOTS, 2017, 41 (04) : 795 - 810
  • [12] An incremental nonparametric Bayesian clustering-based traversable region detection method
    Honggu Lee
    Kiho Kwak
    Sungho Jo
    Autonomous Robots, 2017, 41 : 795 - 810
  • [13] A clustering-based method for fuzzy modeling
    Wong, CC
    Chen, CC
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1999, E82D (06) : 1058 - 1065
  • [14] CDNM: Clustering-Based Data Normalization Method For Automated Vulnerability Detection
    Wu, Tongshuai
    Chen, Liwei
    Du, Gewangzi
    Zhu, Chenguang
    Cui, Ningning
    Shi, Gang
    COMPUTER JOURNAL, 2024, 67 (04): : 1538 - 1549
  • [15] Clustering-based method for fuzzy modeling
    Tamkang Univ, Taipei Hsien, Taiwan
    IEICE Trans Inf Syst, 6 (1058-1065):
  • [16] A Clustering-Based Evidence Reasoning Method
    Li, Xinde
    Wang, Fengyu
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2016, 31 (07) : 698 - 721
  • [17] A comparative evaluation of clustering-based outlier detection
    Vinces, Braulio V. Sanchez
    Schubert, Erich
    Zimek, Arthur
    Cordeiro, Robson L. F.
    DATA MINING AND KNOWLEDGE DISCOVERY, 2025, 39 (02)
  • [18] Fuzzy Clustering-Based Approach for Outlier Detection
    Al-Zoubi, Moh'd Belal
    Ali, Al-Dahoud
    Yahya, Abdelfatah A.
    RECENT ADVANCES AND APPLICATIONS OF COMPUTER ENGINEERING: PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE (ACE 10), 2010, : 192 - +
  • [19] Spam Detection Using Clustering-Based SVM
    Pandya, Darshit
    PROCEEDINGS OF THE 2019 2ND INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND MACHINE INTELLIGENCE (MLMI 2019), 2019, : 12 - 15
  • [20] Adaptive Clustering-Based Collusion Detection in Crowdsourcing
    Xu, Ruoyu
    Li, Gaoxiang
    Jin, Wei
    Chen, Austin
    Sheng, Victor S.
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT IV, 2023, 14089 : 261 - 275