Machine-Learning-Based Online Distributed Denial-of-Service Attack Detection Using Spark Streaming

被引:0
|
作者
Zhou, Baojun [1 ]
Li, Jie [2 ]
Wu, Jinsong [3 ]
Guo, Song [4 ]
Gu, Yu [5 ]
Li, Zhetao [6 ]
机构
[1] Univ Tsukuba, Dept Comp Sci, Tsukuba, Ibaraki, Japan
[2] Univ Tsukuba, Fac Engn Informat & Syst, Tsukuba, Ibaraki, Japan
[3] Univ Chile, Dept Elect Engn, Santiago, Chile
[4] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
[5] Hefei Univ, Sch Comp & Informat, Hefei, Peoples R China
[6] Xiangtan Univ, Coll Informat Engn, Xiangtan, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In order to cope with the increasing number of cyber attacks, network operators must monitor the whole network situations in real time. Traditional network monitoring method that usually works on a single machine, however, is no longer suitable for the huge traffic data nowadays due to its poor processing ability. In this paper, we propose a machine-learning-based online Internet traffic monitoring system using Spark Streaming, a stream-processing-based big data framework, to detect DDoS attacks in real time. The system consists of three parts, collector, messaging system and stream processor. We use a correlation-based feature selection method and choose 4 most necessary network features in our machine-learning-based DDoS detection algorithm. We verify the result of feature selection method by a comparative experiment and compare the detection accuracy of 3 machine learning methods - Naive Bayes, Logistic Regression and Decision Tree. Finally, we conduct experiments in a cluster with the standalone mode, showing that our system can detect 3 typical DDoS attacks - TCP flooding, UDP flooding and ICMP flooding at the accuracy of more than 99.3%. It also shows the system performs well even for large Internet traffic.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Voting extreme learning machine based distributed denial of service attack detection in cloud computing
    Kushwah, Gopal Singh
    Ranga, Virender
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [22] Distributed denial-of-service and intrusion detection
    Zhou, Xiaobo
    Xu, Cheng-Zhong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 819 - 822
  • [23] Denial-of-service attack-detection techniques
    Carl, G
    Kesidis, G
    Brooks, RR
    Rai, S
    [J]. IEEE INTERNET COMPUTING, 2006, 10 (01) : 82 - 89
  • [24] Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
    Tan, Zhiyuan
    Jamdagni, Aruna
    He, Xiangjian
    Nanda, Priyadarsi
    Liu, Ren Ping
    [J]. NEURAL INFORMATION PROCESSING, PT III, 2011, 7064 : 756 - +
  • [25] A BitTorrent-driven distributed denial-of-service attack
    Harrington, Jerome
    Kuwanoe, Corey
    Zou, Cliff C.
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 261 - 268
  • [26] Gradient Techniques to Predict Distributed Denial-Of-Service Attack
    Qamar, Roheen
    [J]. Iraqi Journal for Computer Science and Mathematics, 2022, 3 (02): : 55 - 71
  • [27] Improvement of Distributed Denial of Service Attack Detection through Machine Learning and Data Processing
    Becerra-Suarez, Fray L.
    Fernandez-Roman, Ismael
    Forero, Manuel G.
    [J]. MATHEMATICS, 2024, 12 (09)
  • [28] Detection of Denial-of-Service Attack Using Weight based Trust Aware Routing Approach
    Dani, Virendra
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2023, 18 (03): : 89 - 97
  • [29] Survey on distributed denial of service attack detection using deep learning: A review
    Jassem, Manal Dawood
    Abdulrahman, Amer Abdulmajeed
    [J]. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (02): : 753 - 762
  • [30] Distributed Denial of Service Detection Using Hybrid Machine Learning Technique
    Barati, Mehdi
    Abdullah, Azizol
    Udzir, Nur Izura
    Mahmod, Ramlan
    Mustapha, Norwati
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 268 - 273