User Behaviour Modelling Based DDoS Attack Detection

被引:0
|
作者
Cepheli, Ozge [1 ]
Buyukcorak, Saliba [1 ]
Kurt, Gunes Karabulut [1 ]
机构
[1] Istanbul Tech Univ, Elekt & Haberlesme Muhendisligi Bolumu, Telsiz Arastirma Lab, Istanbul, Turkey
关键词
DDoS; user modeling; expectation maximization; EM;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Distributed Denial of Service (DDoS) attacks are one of the most important threads in network systems. Due to the distributed nature, DDoS attacks are very hard to detect, while they also have the destructive potential of classical denial of service attacks. In this study, a novel 2-step system is proposed for the detection of DDoS attacks. In the first step an anomaly detection is performed on the destination IP traffic. If an anomaly is detected on the network, the system proceeds into the second step where a decision on every user is made due to the behaviour models. Hence, it is possible to detect attacks in the network that diverges from users' behavior model.
引用
收藏
页码:2186 / 2189
页数:4
相关论文
共 50 条
  • [31] Global detection of DDoS attack based on time and frequency analysis
    Hua, Luo
    Hu, Guang-Min
    Yao, Xing-Miao
    [J]. 2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 462 - +
  • [32] DDoS Attack Detection Method Based on Linear Prediction Model
    Cheng, Jieren
    Yin, Jianping
    Wu, Chengkun
    Zhang, Boyun
    Liu, Yun
    [J]. EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 1004 - +
  • [33] Feature Extraction and Construction of Application Layer DDoS Attack Based on User Behavior
    Liao Qin
    Li Hong
    Kang Songlin
    Liu Chuchu
    [J]. 2014 33RD CHINESE CONTROL CONFERENCE (CCC), 2014, : 5492 - 5497
  • [34] Proactive DDoS Attack Detection and Isolation
    Kansal, Vaishali
    Dave, Mayank
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 334 - 338
  • [35] Detection and analysis types of DDoS attack
    Navruzov, Erkin
    Kabulov, Anvar
    [J]. 2022 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2022, : 203 - 209
  • [36] Spatial Correlation Detection of DDoS Attack
    Li, Zonglin
    Hu, Guangming
    Yao, Xingmiao
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 304 - 308
  • [37] DeepDDoS: Online DDoS Attack Detection
    Shi, Zhenping
    Li, Jie
    Wu, Chentao
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [38] Modelling User Search Behaviour Based on Process
    Zhuang, Mengdie
    [J]. SIGIR'16: PROCEEDINGS OF THE 39TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2016, : 1179 - 1179
  • [39] An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks
    Shojaei, Maryam
    Movahhedinia, Naser
    Ladani, Behrouz Tork
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 129 - 143
  • [40] DDoS Attack Intrusion Detection System Based on Hybridization of CNN and LSTM
    Issa, Ahmet Sardar Ahmed
    Albayrak, Zafer
    [J]. ACTA POLYTECHNICA HUNGARICA, 2023, 20 (02) : 105 - 123