Detection of Slowloris Attacks using Machine Learning Algorithms

被引:1
|
作者
Rios, Vinicius de Miranda [1 ]
Inacio, Pedro R. M. [2 ]
Magoni, Damien [3 ]
Freire, Mario M. [2 ]
机构
[1] Inst Fed Educ Ciencia & Tecnol Tocantins, Palmas, Tocantins, Brazil
[2] Univ Beira Interior, Inst Telecomunicacoes, Covilha, Portugal
[3] Univ Bordeaux, LaBRI, CNRS, Talence, France
关键词
Denial of Service (DoS) attack; fuzzy logic; low-rate DoS attack; machine learning; Slowloris; DDOS DETECTION;
D O I
10.1145/3605098.3635919
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Slowloris attack, a variant of the slow Denial-of-Service (DoS) attack, is a stealthy threat that aims to take down web services provided by companies and institutions. It is able to pass through the traditional defense systems, due to the low amount and high latency of its attack traffic, often mimicking legitimate user traffic. Therefore, it is necessary to investigate techniques that can detect and mitigate this type of attack and simultaneously prevent legitimate user traffic from being blocked. In this work, we investigate nine machine learning algorithms for detecting Slowloris attacks, as well as a new combination based on Fuzzy Logic (FL), Random Forest (RF), and Euclidean Distance (ED) that we call FRE. We first generate Slowloris attack traffic traces in various environments. We then assess these algorithms under two scenarios: hyperparameters with default values and optimized hyperparameters. We show that most of these machine learning algorithms perform very well, with the random forest leading to the best classification results with test accuracy values reaching 99.52%. We also show that our FRE method outperforms all these algorithms, with test accuracy values reaching 99.8%.
引用
下载
收藏
页码:1321 / 1330
页数:10
相关论文
共 50 条
  • [1] Detection of DDoS Attacks using Machine Learning Algorithms
    Saini, Parvinder Singh
    Behal, Sunny
    Bhatia, Sajal
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 16 - 21
  • [2] DDoS Attacks Detection Using Machine Learning Algorithms
    Li, Qian
    Meng, Linhai
    Zhang, Yuan
    Yan, Jinyao
    DIGITAL TV AND MULTIMEDIA COMMUNICATION, 2019, 1009 : 205 - 216
  • [3] IoT Routing Attacks Detection Using Machine Learning Algorithms
    Sana Rabhi
    Tarek Abbes
    Faouzi Zarai
    Wireless Personal Communications, 2023, 128 : 1839 - 1857
  • [4] Phishing Attacks Detection Using Ensemble Machine Learning Algorithms
    Innab, Nisreen
    Osman, Ahmed Abdelgader Fadol
    Ataelfadiel, Mohammed Awad Mohammed
    Abu-Zanona, Marwan
    Elzaghmouri, Bassam Mohammad
    Zawaideh, Farah H.
    Alawneh, Mouiad Fadeil
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (01): : 1325 - 1345
  • [5] IoT Routing Attacks Detection Using Machine Learning Algorithms
    Rabhi, Sana
    Abbes, Tarek
    Zarai, Faouzi
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 128 (03) : 1839 - 1857
  • [6] Detection analysis of malicious cyber attacks using machine learning algorithms
    Karthika, R. A.
    Maheswari, M.
    MATERIALS TODAY-PROCEEDINGS, 2022, 68 : 26 - 34
  • [7] DETECTION AND PREVENTION OF CYBER DEFENSE ATTACKS USING MACHINE LEARNING ALGORITHMS
    Shang, Yongqiang
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (02): : 760 - 769
  • [8] A Review of Intrusion Detection Systems Using Machine Learning: Attacks, Algorithms and Challenges
    Luis Gutierrez-Garcia, Jose
    Sanchez-DelaCruz, Eddy
    del Pilar Pozos-Parra, Maria
    ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2, 2023, 652 : 59 - 78
  • [9] Detection and Defense Algorithms of Different Types of DDoS Attacks Using Machine Learning
    Yusof, Mohd Azahari Mohd
    Ali, Fakariah Hani Mohd
    Darus, Mohamad Yusof
    COMPUTATIONAL SCIENCE AND TECHNOLOGY, ICCST 2017, 2018, 488 : 370 - 379
  • [10] Classification of SSH Attacks using Machine Learning Algorithms
    Sadasivam, Gokul Kannan
    Hota, Chittaranjan
    Anand, Bhojan
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 260 - 265