On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic

被引:0
|
作者
Feng, Yebo [1 ]
Li, Jun [1 ]
Sisodia, Devkishen [2 ]
Reiher, Peter [3 ]
机构
[1] Univ Oregon, Dept Comp Sci, Eugene, OR 97403 USA
[2] Calif Polytech State Univ San Luis Obispo, Dept Comp Sci & Software Engn, San Luis Obispo, CA 93407 USA
[3] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
关键词
Anomaly detection; DDoS detection; explainable machine learning; K-nearest neighbors (KNN); distributed denial-of-service (DDoS); principal component analysis (PCA); traffic analysis; DDOS ATTACKS;
D O I
10.1109/TDSC.2023.3301293
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Launched from numerous end-hosts throughout the Internet, a distributed denial-of-service (DDoS) attack can exhaust the network bandwidth or other resources of a victim, cripple its service, and make it unavailable to legitimate clients. Recently many learning-based approaches attempt to detect DDoS attacks, but their results are often hardly explainable to users and their models are seldom adaptable to new environments. In this paper, we propose a new learning-based DDoS detection approach. It detects DDoS attacks via an enhanced k-nearest neighbors (KNN) algorithm, which utilizes a k-dimensional (KD) tree to speed up the detection process, and classifies DDoS sources at a fine granularity according to each IP's risk level. Compared to previous DDoS detection approaches, this approach outputs explanatory information that enables network administrators to easily inspect detection results and make necessary interventions. Moreover, this approach is adaptable in that users do not need to retrain the detection model to have it fit with a new network environment. We evaluated this approach in both simulated environments and the real world, achieving more than 95.6% accuracy in detecting DDoS attacks at line speed. In addition, we carried out a human subject study on its explainability, demonstrating that the outputs can help people better understand the attack and make interventions precisely and promptly.
引用
收藏
页码:2211 / 2226
页数:16
相关论文
共 50 条
  • [41] Collaborative Detection and Mitigation of Distributed Denial-of-Service Attacks on Software-Defined Network
    Omer Elsier Tayfour
    Muhammad Nadzir Marsono
    [J]. Mobile Networks and Applications, 2020, 25 : 1338 - 1347
  • [42] A Novel Distributed Denial-of-Service Attack Detection Scheme for Software Defined Networking Environments
    Wu, Di
    Li, Jie
    Das, Sajal K.
    Wu, Jinsong
    Ji, Yusheng
    Li, Zhetao
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [43] An augmented K-means clustering approach for the detection of distributed denial-of-service attacks
    Marvi, Murk
    Arfeen, Asad
    Uddin, Riaz
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2021, 31 (06)
  • [44] Distributed denial-of-service attack detection scheme-based joint-entropy
    Rahmani, Hamza
    Sahli, Nabil
    Kamoun, Farouk
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (09) : 1049 - 1061
  • [45] Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks
    Aswad, Firas Mohammed
    Ahmed, Ali Mohammed Saleh
    Alhammadi, Nafea Ali Majeed
    Khalaf, Bashar Ahmad
    Mostafa, Salama A.
    [J]. JOURNAL OF INTELLIGENT SYSTEMS, 2023, 32 (01)
  • [46] Denial-of-service attacks
    Neumann, PG
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 136 - 136
  • [47] 21 Years of Distributed Denial-of-Service: Current State of Affairs
    Osterweil, Eric
    Stavrou, Angelos
    Zhang, Lixia
    [J]. COMPUTER, 2020, 53 (07) : 88 - 92
  • [48] Filter Assignment Policy Against Distributed Denial-of-Service Attack
    Biswas, Rajorshi
    Wu, Jie
    [J]. 2018 IEEE 24TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2018), 2018, : 537 - 544
  • [49] Defeating distributed denial-of-service attack with deterministic bit marking
    Kim, Y
    Jo, JY
    Merat, FL
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1363 - 1367
  • [50] Distributed computing: an experimental investigation of a malicious denial-of-service applet
    Soh, BC
    Young, S
    [J]. COMPUTER COMMUNICATIONS, 1998, 21 (07) : 670 - 674