A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation

Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, K. Sakurai
{"title":"A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation","authors":"Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, K. Sakurai","doi":"10.1109/AsiaJCIS.2016.24","DOIUrl":null,"url":null,"abstract":"DRDoS (Distributed Reflection Denial of Service) attack is a kind of DoS (Denial of Service) attack, in which third-party servers are tricked into sending large amounts of data to the victims. That is, attackers use source address IP spoofing to hide their identity and cause third-parties to send data to the victims as identified by the source address field of the IP packet. This is called reflection because the servers of benign services are tricked into \"reflecting\" attack traffic to the victims. The most typical existing detection methods of such attacks are designed based on known attacks by protocol and are difficult to detect the unknown ones. According to our investigations, one protocol-independent detection method has been existing, which is based on the assumption that a strong linear relationship exists among the abnormal flows from the reflector to the victim. Moreover, the method is assumed that the all packets from reflectors are attack packets when attacked, which is clearly not reasonable. In this study, we found five features are effective for detecting DRDoS attacks, and we proposed a method to detect DRDoS attacks using these features and machine learning algorithms. Its detection performance is experimentally examined and the experimental result indicates that our proposal is of clearly better detection performance.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS.2016.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17

Abstract

DRDoS (Distributed Reflection Denial of Service) attack is a kind of DoS (Denial of Service) attack, in which third-party servers are tricked into sending large amounts of data to the victims. That is, attackers use source address IP spoofing to hide their identity and cause third-parties to send data to the victims as identified by the source address field of the IP packet. This is called reflection because the servers of benign services are tricked into "reflecting" attack traffic to the victims. The most typical existing detection methods of such attacks are designed based on known attacks by protocol and are difficult to detect the unknown ones. According to our investigations, one protocol-independent detection method has been existing, which is based on the assumption that a strong linear relationship exists among the abnormal flows from the reflector to the victim. Moreover, the method is assumed that the all packets from reflectors are attack packets when attacked, which is clearly not reasonable. In this study, we found five features are effective for detecting DRDoS attacks, and we proposed a method to detect DRDoS attacks using these features and machine learning algorithms. Its detection performance is experimentally examined and the experimental result indicates that our proposal is of clearly better detection performance.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于机器学习的ddos攻击检测方法及其性能评估
DRDoS (Distributed Reflection Denial of Service)攻击是一种DoS (Denial of Service)攻击,通过欺骗第三方服务器向受害者发送大量数据。即攻击者通过源地址IP欺骗来隐藏自己的身份,使第三方根据IP报文的源地址字段来识别攻击者的数据。这被称为反射,因为良性服务的服务器被欺骗,将攻击流量“反射”给受害者。现有最典型的此类攻击检测方法是基于已知的协议攻击设计的,难以检测到未知的攻击。根据我们的研究,一种与协议无关的检测方法已经存在,该方法基于反射器到受害者的异常流之间存在强线性关系的假设。而且,该方法在攻击时假定反射器的所有报文都是攻击报文,这显然是不合理的。在本研究中,我们发现了检测DRDoS攻击有效的五个特征,并提出了一种利用这些特征和机器学习算法检测DRDoS攻击的方法。对其检测性能进行了实验检验,实验结果表明我们的方案具有明显更好的检测性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation Comparing Malware Samples for Unpacking: A Feasibility Study Implementation Experiences and Design Challenges for Resilient SDN Based Secure WAN Overlays NFC-based Mobile Payment Protocol with User Anonymity
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1