A combined data mining approach for DDoS attack detection

被引:0
|
作者
Kim, M [1 ]
Na, H
Chae, K
Bang, H
Na, J
机构
[1] Ewha Womans Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Elect & Telecommun Res Inst, Taejon, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently; as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not provide effective defense against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. It is necessary to analyze the fundamental features of DDoS attacks because these attacks can easily vary the used port/protocol, or operation method. In this paper, we propose a combined data mining approach for modeling the traffic pattern of normal and diverse attacks. This approach uses the automatic feature selection mechanism for selecting the important attributes. And the classifier is built with the theoretically selected attribute through the neural network. And then, our experimental results show that our approach can provide the best performance on the real network, in comparison with that by heuristic feature selection and any other single data mining approaches.
引用
收藏
页码:943 / 950
页数:8
相关论文
共 50 条
  • [1] An alert analysis approach to DDoS attack detection
    Hoque, Nazrul
    Bhattacharyya, Dhruba K.
    Kalita, Jugal K.
    2016 INTERNATIONAL CONFERENCE ON ACCESSIBILITY TO DIGITAL WORLD (ICADW), 2016, : 33 - 38
  • [2] A Novel Hybrid Approach for Detection of DDoS Attack
    Redekar, Pooja
    Chatterjee, Madhumita
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 251 - 255
  • [3] Combined data mining approach for intrusion detection
    Zurutuza, U.
    Uribeetxeberria, R.
    Azketa, E.
    Gil, G.
    Lizarraga, J.
    Fernandez, M.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 67 - 73
  • [4] Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol
    Zolotukhin, Mikhail
    Hamalainen, Timo
    Kokkonen, Tero
    Niemela, Antti
    Siltanen, Jarmo
    INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, 2015, 9247 : 274 - 285
  • [5] DDoS Attack Preventing and Detection with the Artificial Intelligence Approach
    Islam, Tariqul
    Jabiullah, Md Ismail
    Abid, Dm Mehedi Hasan
    INTELLIGENT COMPUTING SYSTEMS (ISICS 2022), 2022, 1569 : 30 - 43
  • [6] Real-Time DDoS Attack Detection System Using Big Data Approach
    Awan, Mazhar Javed
    Farooq, Umar
    Babar, Hafiz Muhammad Aqeel
    Yasin, Awais
    Nobanee, Haitham
    Hussain, Muzammil
    Hakeem, Owais
    Zain, Azlan Mohd
    SUSTAINABILITY, 2021, 13 (19)
  • [7] Distributed denial of service (DDoS) attack detection using data mining approach in cloud-assisted wireless body area networks
    Latif, Rabia
    Abbas, Haider
    Latif, Seemab
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2016, 23 (1-2) : 24 - 35
  • [8] Early DDoS Detection Based on Data Mining Techniques
    Xylogiannopoulos, Konstantinos
    Karampelas, Panagiotis
    Alhajj, Reda
    INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 190 - 199
  • [9] The effectiveness of data mining techniques in the detection of DDoS attacks
    Czyczyn-Egird, Daniel
    Wojszczyk, Rafal
    DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, 2018, 620 : 53 - 60
  • [10] A DDOS Intrusion Detection Method Based On Data Mining
    Tian Jun-feng
    Pang Tao
    Du Rui-zhong
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 42 - 46