Feature dynamic deep learning approach for DDoS mitigation within the ISP domain

被引:16
|
作者
Ko, Ili [1 ]
Chambers, Desmond [1 ]
Barrett, Enda [1 ]
机构
[1] Natl Univ Ireland, Univ Rd, Galway, Ireland
关键词
IoT; DDoS mitigation; Deep learning; SOM; Network security; Cyber security; Machine learning attacks; Unsupervised learning; Self organizing map; DEFENSE;
D O I
10.1007/s10207-019-00453-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of the Mirai malware facilitated a DDoS attack vector to surge to almost 1 Tbps in 2016, instigated by less than 150,000 infected IoT devices. With the infection of five new IoT devices per minute, the size of Mirai botnet was enlarged to 2.5 millions devices by the end of 2016. The continuous adaptation of the Mirai malware enables the modern variant to dynamically update its malware scripts on the fly to launch even more advanced and malevolent DDoS attacks, which dramatically escalates the level of difficulty with mitigating DDoS attacks. Many researchers endeavour to develop mitigation systems to keep up with the increasing security threats. Nonetheless, most presented models provide inefficient solutions either by utilising auxiliary servers at the host site, on the cloud or at dedicated data scrubbing centres. Since internet service providers (ISPs) connect the internet with users, the mitigation system should be deployed within the ISP domain to deliver a more efficient solution. Accordingly, we propose a stacked self-organising map, which is a feature dynamic deep learning approach that utilises netflow data collected by the ISP to combat the dynamic nature of novel DDoS attacks.
引用
收藏
页码:53 / 70
页数:18
相关论文
共 50 条
  • [21] Towards Effective Detection of Recent DDoS Attacks: A Deep Learning Approach
    Lopes, Ivandro Ortet
    Zou, Deqing
    Ruambo, Francis A.
    Akbar, Saeed
    Yuan, Bin
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [22] Canopy: A Learning-based Approach for Automatic Low-and-Slow DDoS Mitigation
    Cadalzo, Lucas
    Todd, Christopher H.
    Obayomi, Banjo
    Moore, W. Brad
    Wong, Anthony C.
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 356 - 367
  • [23] DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning
    Sanjalawe, Yousef
    Althobaiti, Turke
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (02): : 3571 - 3588
  • [24] Spiking Domain Feature Extraction with Temporal Dynamic Learning
    Zheng, Honghao
    Yi, Yang
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 706 - 710
  • [25] Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks
    Liu, Yandong
    Dong, Mianxiong
    Otat, Kaoru
    Li, Jianhua
    Wu, Jun
    2018 IEEE 23RD INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2018, : 80 - 85
  • [26] A Deep Learning Approach for Automotive Radar Interference Mitigation
    Mun, Jiwoo
    Kim, Heasung
    Lee, Jungwoo
    2018 IEEE 88TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2018,
  • [27] Joint Domain Alignment and Discriminative Feature Learning for Unsupervised Deep Domain Adaptation
    Chen, Chao
    Chen, Zhihong
    Jiang, Boyuan
    Jin, Xinyu
    THIRTY-THIRD AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FIRST INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / NINTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2019, : 3296 - 3303
  • [28] Recognition of DDoS attacks based on images correlation analysis within deep learning framework
    Jing, Hengchang
    Wang, Jian
    SOFT COMPUTING, 2022, 26 (21) : 11783 - 11794
  • [29] A Deep Learning Approach to Android Malware Feature Learning and Detection
    Su, Xin
    Zhang, Dafang
    Li, Wenjia
    Zhao, Kai
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 244 - 251
  • [30] Recognition of DDoS attacks based on images correlation analysis within deep learning framework
    Hengchang Jing
    Jian Wang
    Soft Computing, 2022, 26 : 11783 - 11794