Implementation of a Clustering-Based LDDoS Detection Method

被引:2
|
作者
Hussain, Tariq [1 ]
Saeed, Muhammad Irfan [2 ]
Khan, Irfan Ullah [3 ]
Aslam, Nida [4 ]
Aljameel, Sumayh S. [3 ]
机构
[1] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou 310018, Peoples R China
[2] Northeastern Univ, Software Coll, Shenyang 110819, Peoples R China
[3] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
[4] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Saudi Aramco Cybersecur Chair, POB 1982, Dammam 31441, Saudi Arabia
关键词
low-rate distributed DoS (LDDoS) attacks; attacks detection; two-step clustering; outliers detection; ATTACKS;
D O I
10.3390/electronics11182804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid advancement and transformation of technology, information and communication technologies (ICT), in particular, have attracted everyone's attention. The attackers took advantage of this and can caused serious problems, such as malware attack, ransomware, SQL injection attack, etc. One of the dominant attacks, known as distributed denial-of-service (DDoS), has been observed as the main reason for information hacking. In this paper, we have proposed a secure technique, called the low-rate distributed denial-of-service (LDDoS) technique, to measure attack penetration and secure communication flow. A two-step clustering method was adopted, where the network traffic was controlled by using the characteristics of TCP traffic with discrete sense; then, the suspicious cluster with the abnormal analysis was detected. This method has proven to be reliable and efficient for LDDoS attacks detection, based on the NS-2 simulator, compared to the exponentially weighted moving average (EWMA) technique, which has comparatively very high false-positive rates. Analyzing abnormal test pieces helps us reduce the false positives. The proposed methodology was implemented using Python for scripting and NS-2 simulator for topology, two public trademark datasets, i.e., Web of Information for Development (WIDE) and Lawrence Berkley National Laboratory (LBNL), were selected for experiments. The experiments were analyzed, and the results evaluated using Wireshark. The proposed LDDoS approach achieved good results, compared to the previous techniques.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] A clustering-based possibilistic method for image classification
    Drummond, I
    Sandri, S
    ADVANCES IN ARTIFICIAL INTELLIGENCE - SBIA 2004, 2004, 3171 : 454 - 463
  • [32] A survey of load balancing and implementation of clustering-based approach for clouds
    Sharma A.
    Pandey R.
    Singh S.P.
    Kumar R.
    Recent Advances in Computer Science and Communications, 2021, 14 (03) : 669 - 677
  • [33] A clustering-based flexible weighting method in AdaBoost and its application to transaction fraud detection
    Yang, Chaofan
    Liu, Guanjun
    Yan, Chungang
    Jiang, Changjun
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (12)
  • [34] A clustering-based flexible weighting method in AdaBoost and its application to transaction fraud detection
    Chaofan YANG
    Guanjun LIU
    Chungang YAN
    Changjun JIANG
    ScienceChina(InformationSciences), 2021, 64 (12) : 69 - 79
  • [35] A clustering-based flexible weighting method in AdaBoost and its application to transaction fraud detection
    Chaofan Yang
    Guanjun Liu
    Chungang Yan
    Changjun Jiang
    Science China Information Sciences, 2021, 64
  • [36] A Clustering-Based Fault Detection Method for Steam Boiler Tube in Thermal Power Plant
    Yu, Jungwon
    Jang, Jaeyel
    Yoo, Jaeyeong
    Park, June Ho
    Kim, Sungshin
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2016, 11 (04) : 848 - 859
  • [37] Clustering-Based Detection of Debye-Scherrer Rings
    Sirhindi, Rabia
    Khan, Nazar
    JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2023, 23 (04)
  • [38] Clustering-based attack detection for adversarial reinforcement learning
    Rubén Majadas
    Javier García
    Fernando Fernández
    Applied Intelligence, 2024, 54 : 2631 - 2647
  • [39] Clustering-Based Recommendation System for Preliminary Disease Detection
    Jain, Gourav
    Mahara, Tripti
    Sharma, S. C.
    Verma, Om Prakash
    Sharma, Tarun
    INTERNATIONAL JOURNAL OF E-HEALTH AND MEDICAL COMMUNICATIONS, 2022, 13 (04)
  • [40] A Mixed Unsupervised Clustering-based Intrusion Detection Model
    Zhang, Cuixiao
    Zhang, Guobing
    Sun, Shanshan
    THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 426 - 428