LDoS attack detection method based on simple statistical features

被引:0
|
作者
Duan X. [1 ,2 ,3 ]
Fu Y. [1 ]
Wang K. [1 ,4 ]
Li B. [1 ]
机构
[1] Department of Information Security, Naval University of Engineering, Wuhan
[2] College of Computer and Information Technology, Xinyang Normal University, Xinyang
[3] Henan Key Laboratory of Analysis and Applications of Education Big Data, Xinyang Normal University, Xinyang
[4] School of Mathematics and Information Engineering, Xinyang Vocational and Technical College, Xinyang
来源
基金
国家重点研发计划;
关键词
attack detection; deep learning; low-rate denial of service; statistical features;
D O I
10.11959/j.issn.1000-436x.2022216
中图分类号
学科分类号
摘要
Traditional low-rate denial of service (LDoS) attack detection methods were complex in feature extraction, high in computational cost, single in experimental data background settings, and outdated in attack scenarios, so it was difficult to meet the demand for LDoS attack detection in a real network environment. By studying the principle of LDoS attack and analyzing the features of LDoS attack traffic, a detection method of LDoS attack based on simple statistical features of network traffic was proposed. By using the simple statistical features of network traffic packets, the detection data sequence was constructed, the time correlation features of input samples were extracted by deep learning technology, and the LDoS attack judgment was made according to the difference between the reconstructed sequence and the original input sequence. Experimental results show that the proposed method can effectively detect the LDoS attack traffic in traffic and has strong adaptability to heterogeneous network traffic. © 2022 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:53 / 64
页数:11
相关论文
共 29 条
  • [1] WU Z J, LI W J, LIU L, Et al., Low-rate DoS attacks, detection, defense, and challenges: a survey, IEEE Access, 8, pp. 43920-43943, (2020)
  • [2] ADI E, BAIG Z, LAM C P, Et al., Low-rate denial-of-service attacks against HTTP/2 services, Proceedings of 2015 5th International Conference on IT Convergence and Security (ICITCS), pp. 1-5, (2015)
  • [3] LI H C, WU X P, JIANG H H., Traffic anomaly detection method in networks based on improved clustering algorithm, Chinese Journal of Network and Information Security, 1, 1, pp. 66-71, (2015)
  • [4] MANIMURUGAN S, ALMUTAIRI S., A user-based video recommendation approach using CAC filtering, PCA with LDOS-CoMoDa, The Journal of Supercomputing, 78, 7, pp. 9377-9391, (2022)
  • [5] LI J, YUN X C, LI S H, Et al., HTTP malicious traffic detection method based on hybrid structure deep neural network, Journal on Communications, 40, 1, pp. 24-33, (2019)
  • [6] SHI W, TANG D, ZHAN S J, Et al., An approach for detecting LDoS attack based on cloud model, Frontiers of Computer Science, 16, 6, pp. 1-12, (2022)
  • [7] KUZMANOVIC A, KNIGHTLY E W., Low-rate TCP-targeted denial of service attacks and counter strategies, Proceedings of IEEE/ACM Transactions on Networking, pp. 683-696, (2005)
  • [8] LIU L, WANG H Y, WU Z J, Et al., The detection method of low-rate DoS attack based on multi-feature fusion, Digital Communications and Networks, 6, 4, pp. 504-513, (2020)
  • [9] SHARAFALDIN I, GHARIB A, LASHKARI A H, Et al., Towards a reliable intrusion detection benchmark dataset, Software Networking, 2017, 1, pp. 177-200, (2017)
  • [10] WU Z J, ZHANG J G, YUE M, Et al., Approach of detecting low-rate DoS attack based on combined features, Journal on Communications, 38, 5, pp. 19-30, (2017)