On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic

被引:0
|
作者
Feng, Yebo [1 ]
Li, Jun [1 ]
Sisodia, Devkishen [2 ]
Reiher, Peter [3 ]
机构
[1] Univ Oregon, Dept Comp Sci, Eugene, OR 97403 USA
[2] Calif Polytech State Univ San Luis Obispo, Dept Comp Sci & Software Engn, San Luis Obispo, CA 93407 USA
[3] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
关键词
Anomaly detection; DDoS detection; explainable machine learning; K-nearest neighbors (KNN); distributed denial-of-service (DDoS); principal component analysis (PCA); traffic analysis; DDOS ATTACKS;
D O I
10.1109/TDSC.2023.3301293
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Launched from numerous end-hosts throughout the Internet, a distributed denial-of-service (DDoS) attack can exhaust the network bandwidth or other resources of a victim, cripple its service, and make it unavailable to legitimate clients. Recently many learning-based approaches attempt to detect DDoS attacks, but their results are often hardly explainable to users and their models are seldom adaptable to new environments. In this paper, we propose a new learning-based DDoS detection approach. It detects DDoS attacks via an enhanced k-nearest neighbors (KNN) algorithm, which utilizes a k-dimensional (KD) tree to speed up the detection process, and classifies DDoS sources at a fine granularity according to each IP's risk level. Compared to previous DDoS detection approaches, this approach outputs explanatory information that enables network administrators to easily inspect detection results and make necessary interventions. Moreover, this approach is adaptable in that users do not need to retrain the detection model to have it fit with a new network environment. We evaluated this approach in both simulated environments and the real world, achieving more than 95.6% accuracy in detecting DDoS attacks at line speed. In addition, we carried out a human subject study on its explainability, demonstrating that the outputs can help people better understand the attack and make interventions precisely and promptly.
引用
收藏
页码:2211 / 2226
页数:16
相关论文
共 50 条
  • [1] Distributed denial-of-service and intrusion detection
    Zhou, Xiaobo
    Xu, Cheng-Zhong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 819 - 822
  • [2] Detecting Distributed Denial-of-Service Attack Traffic by Statistical Test
    Chen, Chin-Ling
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1190 - 1194
  • [3] A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test
    Chen, Chin-Ling
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (02) : 488 - 504
  • [4] Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of Things
    Mergendahl, Samuel
    Li, Jun
    [J]. 2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [5] A Coordinated Detection and Response Scheme for Distributed Denial-of-Service Attacks
    Lam, Ho-Yu
    Li, Chi-Pan
    Chanson, Samuel T.
    Yeung, Dit-Yan
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2165 - 2170
  • [6] A detection scheme against Distributed Reflector Denial-of-Service attack
    Kim, YS
    Jeon, JC
    Jeon, JW
    Yoo, KY
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 44 - 48
  • [7] Intrusion Detection Systems' Performance for Distributed Denial-of-Service Attack
    de Sousa Araujo, Tiago Emilio
    Matos, Fernando Menezes
    Moreira, Josilene Aires
    [J]. 2017 CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (CHILECON), 2017,
  • [8] Design and Development of Proactive Models for Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks
    Nagesh, H. R.
    Sekaran, K. Chandra
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 168 - 176
  • [9] Detection of Denial-of-service Attacks
    Anh Quang Tran
    [J]. 计算机工程, 2002, (S1) : 86 - 91
  • [10] On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic
    Zhang, Mingwei
    Shi, Lumin
    Sisodia, Devkishen
    Li, Jun
    Reiher, Peter
    [J]. 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 180 - 188