Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy

被引:0
|
作者
Sharafaldin, Iman [1 ]
Lashkari, Arash Habibi [1 ]
Hakak, Saqib [1 ]
Ghorbani, Ali A. [1 ]
机构
[1] Univ New Brunswick UNB, Canadian Inst Cybersecur CIC, Fac Comp Sci, Fredericton, NB, Canada
关键词
DDoS; IDS; DDoS Dataset; DDoS taxonomy; Network Traffic;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed Denial of Service (DDoS) attack is a menace to network security that aims at exhausting the target networks with malicious traffic. Although many statistical methods have been designed for DDoS attack detection, designing a real-time detector with low computational overhead is still one of the main concerns. On the other hand, the evaluation of new detection algorithms and techniques heavily relies on the existence of well-designed datasets. In this paper, first, we review the existing datasets comprehensively and propose a new taxonomy for DDoS attacks. Secondly, we generate a new dataset, namely CICDDoS2019, which remedies all current shortcomings. Thirdly, using the generated dataset, we propose a new detection and family classificaiton approach based on a set of network flow features. Finally, we provide the most important feature sets to detect different types of DDoS attacks with their corresponding weights.
引用
下载
收藏
页数:8
相关论文
共 50 条
  • [31] A taxonomy of DDoS attack and DDoS Defense mechanisms
    Mirkovic, J
    Reiher, P
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (02) : 39 - 53
  • [32] Toward Generating a New Cloud-Based Distributed Denial of Service (DDoS) Dataset and Cloud Intrusion Traffic Characterization
    Shafi, Mohammadmoein
    Lashkari, Arash Habibi
    Rodriguez, Vicente
    Nevo, Ron
    INFORMATION, 2024, 15 (04)
  • [33] Honeypot Scheme for Distributed Denial-of-Service Attack
    Das, Vinu V.
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 497 - 501
  • [34] Intrusion detection of distributed denial of service attack in cloud
    S. Velliangiri
    J. Premalatha
    Cluster Computing, 2019, 22 : 10615 - 10623
  • [35] Modeling and simulation for detecting a distributed denial of service attack
    Seo, HS
    Cho, HT
    AL 2002: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2002, 2557 : 179 - 190
  • [36] Attack Detection of Distributed Denial of Service Based on Splunk
    Su, Te-Jen
    Wang, Shih-Ming
    Chen, Yi-Feng
    Liu, Chao-Liang
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS FOR SCIENCE AND ENGINEERING (IEEE-ICAMSE 2016), 2016, : 397 - 400
  • [37] Characterization and Comparison of Distributed Denial of Service Attack Tools
    Kaur, Harjeet
    Behal, Sunny
    Kumar, Krishan
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1139 - 1145
  • [38] Intrusion detection of distributed denial of service attack in cloud
    Velliangiri, S.
    Premalatha, J.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10615 - 10623
  • [39] Distributed Denial of Service attack on Cloud: Detection and Prevention
    Khadka, Bikram
    Withana, Chandana
    Alsadoon, Abeer
    Elchouemi, Amr
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [40] Distributed Denial of Service Attack Prevention at Source Machines
    Misono, Masanori
    Yoshida, Kaito
    Hwang, Juho
    Shinagawa, Takahiro
    2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 488 - 495