基于MKL算法的DDoS攻击检测

Deepa V, B. Sivakumar
{"title":"基于MKL算法的DDoS攻击检测","authors":"Deepa V, B. Sivakumar","doi":"10.1109/ICITIIT54346.2022.9744225","DOIUrl":null,"url":null,"abstract":"Software-defined networking (SDN) is a good approach, framework for virtually designing and building hardware network components. In the traditional network domain, fixed automation is made, and it is not possible to change the network connections. SDN has dynamic automation but is still exposed to DDoS attacks. With rising detection accuracy, IDS (Intrusion Detection System) against DDoS still faces provocation in detecting the intrusions and reducing the false alarm rate. In the network, the most efficient way of spotting intrusions is through the deployment of machine Learning (ML) - IDS and deep Learning (DL) - IDS systems. In this paper, our method based on DL proposes an efficient unsupervised level of shallow and deep multiple kernel level algorithms (MKL). To detect the malicious traffic, carry out experiments on DDoS attack databases with the MKL algorithm and correlate the end results with developed methods. Our test outcome reveal that the proposed method provides better accuracy and detection rate.","PeriodicalId":184353,"journal":{"name":"2022 International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection of DDoS Attack using Multiple Kernel Level (MKL) Algorithm\",\"authors\":\"Deepa V, B. Sivakumar\",\"doi\":\"10.1109/ICITIIT54346.2022.9744225\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software-defined networking (SDN) is a good approach, framework for virtually designing and building hardware network components. In the traditional network domain, fixed automation is made, and it is not possible to change the network connections. SDN has dynamic automation but is still exposed to DDoS attacks. With rising detection accuracy, IDS (Intrusion Detection System) against DDoS still faces provocation in detecting the intrusions and reducing the false alarm rate. In the network, the most efficient way of spotting intrusions is through the deployment of machine Learning (ML) - IDS and deep Learning (DL) - IDS systems. In this paper, our method based on DL proposes an efficient unsupervised level of shallow and deep multiple kernel level algorithms (MKL). To detect the malicious traffic, carry out experiments on DDoS attack databases with the MKL algorithm and correlate the end results with developed methods. Our test outcome reveal that the proposed method provides better accuracy and detection rate.\",\"PeriodicalId\":184353,\"journal\":{\"name\":\"2022 International Conference on Innovative Trends in Information Technology (ICITIIT)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Innovative Trends in Information Technology (ICITIIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITIIT54346.2022.9744225\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Innovative Trends in Information Technology (ICITIIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITIIT54346.2022.9744225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

软件定义网络(SDN)是虚拟设计和构建硬件网络组件的一种很好的方法和框架。在传统的网络领域,自动化是固定的,不可能改变网络连接。SDN具有动态自动化功能,但仍然容易受到DDoS攻击。随着检测准确率的提高,针对DDoS的入侵检测系统在检测入侵和降低虚警率方面仍然面临挑战。在网络中,发现入侵的最有效方法是通过部署机器学习(ML) - IDS和深度学习(DL) - IDS系统。本文基于深度学习提出了一种有效的无监督层次的浅、深多核层次算法。为了检测恶意流量,使用MKL算法在DDoS攻击数据库上进行实验,并将最终结果与所开发的方法进行关联。实验结果表明,该方法具有较高的准确率和检出率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Detection of DDoS Attack using Multiple Kernel Level (MKL) Algorithm
Software-defined networking (SDN) is a good approach, framework for virtually designing and building hardware network components. In the traditional network domain, fixed automation is made, and it is not possible to change the network connections. SDN has dynamic automation but is still exposed to DDoS attacks. With rising detection accuracy, IDS (Intrusion Detection System) against DDoS still faces provocation in detecting the intrusions and reducing the false alarm rate. In the network, the most efficient way of spotting intrusions is through the deployment of machine Learning (ML) - IDS and deep Learning (DL) - IDS systems. In this paper, our method based on DL proposes an efficient unsupervised level of shallow and deep multiple kernel level algorithms (MKL). To detect the malicious traffic, carry out experiments on DDoS attack databases with the MKL algorithm and correlate the end results with developed methods. Our test outcome reveal that the proposed method provides better accuracy and detection rate.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
HomeID: Home Visitors Recognition using Internet of Things and Deep Learning Algorithms Auto-Encoder LSTM for learning dependency of traffic flow by sequencing spatial-temporal traffic flow rate: A speed up technique for routing vehicles between origin and destination A Statistical Study and Analysis to Identify the Importance of Open-source Software Data Imputation Techniques: An Empirical Study using Chronic Kidney Disease and Life Expectancy Datasets Miniature probability maps using resource limited embedded device for classification of histopathological images
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1