Efficient ensemble to combat flash attacks

被引:5
|
作者
Kumar, Om C. U. [1 ]
Bhama, Ponsy R. K. Sathia [2 ]
机构
[1] Easwari Engn Coll, Dept CSE, Chennai 600089, Tamil Nadu, India
[2] Anna Univ, Dept Comp Technol, MIT Campus, Chennai, Tamil Nadu, India
关键词
botnet; convolutional neural network; denoising autoencoder; DDoS; ensemble; multilayer perceptron; INTRUSION; PCA;
D O I
10.1111/coin.12488
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Flash event generates enormous traffic and the cloud service providers use sustaining techniques like scaling and content delivery network to up their services. One of the main bottlenecks that the cloud service providers still find difficult to tackle is flash attacks. Illegitimate users send craftily designed packets to land up inside the server for wreaking havoc. As deep learning autoencoder has the potential to detect malicious traffic it has been used in this research study to develop an ensemble. Convolutional neural network is efficacious in overcoming the issue of overfitting; deep autoencoder is proficient in extracting features through dimensionality reduction. In order to obtain both these advantages it was decided to develop an ensemble keeping denoising autoencoder as the core element. The process of addressing a flash attack requires first detecting the presence of bot in malicious traffic, second studying its nature by observing its behavioral manifestations. Detection of botnet was achieved by three ensembles, namely, DAE_CNN, DAE_MLP, and DAE_XGB. But capturing its external manifested behavior is challenging, because the bot signatures are always in a state of flux. The simulated empirical study yielded an appreciable outcome. Its accuracy rate was 99.9% for all the three models and the false positive rates were 0, 0.006, and 0.001, respectively.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Efficient Slide Attacks
    Bar-On, Achiya
    Biham, Eli
    Dunkelman, Orr
    Keller, Nathan
    JOURNAL OF CRYPTOLOGY, 2018, 31 (03) : 641 - 670
  • [22] Investigating rarity in web attacks with ensemble learners
    Zuech, Richard
    Hancock, John
    Khoshgoftaar, Taghi M.
    JOURNAL OF BIG DATA, 2021, 8 (01)
  • [23] AN IMPROVED ENSEMBLE APPROACH FOR DOS ATTACKS DETECTION
    Alguliyev, R. M.
    Aliguliyev, R. M.
    Imamverdiyev, Y. N.
    Sukhostat, L., V
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2018, (02) : 73 - 82
  • [24] Efficient Template Attacks
    Choudary, Omar
    Kuhn, Markus G.
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 : 253 - 270
  • [25] Investigating rarity in web attacks with ensemble learners
    Richard Zuech
    John Hancock
    Taghi M. Khoshgoftaar
    Journal of Big Data, 8
  • [26] Blackbox Attacks via Surrogate Ensemble Search
    Cai, Zikui
    Song, Chengyu
    Krishnamurthy, Srikanth
    Roy-Chowdhury, Amit
    Asif, M. Salman
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35 (NEURIPS 2022), 2022,
  • [27] Nonlinear Network Coding is Necessary to Combat General Byzantine Attacks
    Kosut, Oliver
    Tong, Lang
    Tse, David
    2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 593 - +
  • [28] FAST: An efficient flash translation layer for flash memory
    Lee, Sang-Won
    Choi, Won-Kyoung
    Park, Dong-Joo
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 879 - 887
  • [29] Allocation of Network Error Correction Flow to Combat Byzantine Attacks
    Xiao, Zhiqing
    Li, Yunzhou
    Zhao, Ming
    Xu, Xibin
    Wang, Jing
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (07) : 2605 - 2618
  • [30] Prolonged exposure therapy for combat and terror attacks related PTSD
    Nacasch, N
    Cohen-Rappaport, G
    Polliack, M
    Zohar, J
    Knobler, H
    Fostick, L
    Yadin, E
    Foa, E
    INTERNATIONAL JOURNAL OF NEUROPSYCHOPHARMACOLOGY, 2004, 7 : S365 - S365