Implementation of a Clustering-Based LDDoS Detection Method

被引:2
|
作者
Hussain, Tariq [1 ]
Saeed, Muhammad Irfan [2 ]
Khan, Irfan Ullah [3 ]
Aslam, Nida [4 ]
Aljameel, Sumayh S. [3 ]
机构
[1] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou 310018, Peoples R China
[2] Northeastern Univ, Software Coll, Shenyang 110819, Peoples R China
[3] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
[4] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Saudi Aramco Cybersecur Chair, POB 1982, Dammam 31441, Saudi Arabia
关键词
low-rate distributed DoS (LDDoS) attacks; attacks detection; two-step clustering; outliers detection; ATTACKS;
D O I
10.3390/electronics11182804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid advancement and transformation of technology, information and communication technologies (ICT), in particular, have attracted everyone's attention. The attackers took advantage of this and can caused serious problems, such as malware attack, ransomware, SQL injection attack, etc. One of the dominant attacks, known as distributed denial-of-service (DDoS), has been observed as the main reason for information hacking. In this paper, we have proposed a secure technique, called the low-rate distributed denial-of-service (LDDoS) technique, to measure attack penetration and secure communication flow. A two-step clustering method was adopted, where the network traffic was controlled by using the characteristics of TCP traffic with discrete sense; then, the suspicious cluster with the abnormal analysis was detected. This method has proven to be reliable and efficient for LDDoS attacks detection, based on the NS-2 simulator, compared to the exponentially weighted moving average (EWMA) technique, which has comparatively very high false-positive rates. Analyzing abnormal test pieces helps us reduce the false positives. The proposed methodology was implemented using Python for scripting and NS-2 simulator for topology, two public trademark datasets, i.e., Web of Information for Development (WIDE) and Lawrence Berkley National Laboratory (LBNL), were selected for experiments. The experiments were analyzed, and the results evaluated using Wireshark. The proposed LDDoS approach achieved good results, compared to the previous techniques.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Adaptive Clustering-Based Collusion Detection in Crowdsourcing
    Xu, Ruoyu
    Li, Gaoxiang
    Jin, Wei
    Chen, Austin
    Sheng, Victor S.
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT IV, 2023, 14089 : 261 - 275
  • [22] Lddos attack detection method based on wavelet decomposition and sliding windows
    Liang L.
    Wenzhi F.
    Zhijun W.
    Meng Y.
    Liang, Liu (liul@cauc-edu-cn), 1600, Beijing University of Posts and Telecommunications (27): : 51 - 61
  • [23] Clustering-Based Network Intrusion Detection System
    Fan, Chun-I
    Lai, Yen-Lin
    Shie, Cheng-Han
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [24] Clustering-Based Discriminant Analysis for Eye Detection
    Chen, Shuo
    Liu, Chengjun
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2014, 23 (04) : 1629 - 1638
  • [25] Data clustering-based fault detection in WSNs
    Yang, Yang
    Liu, Qian
    Gao, Zhipeng
    Qiu, Xuesong
    Rui, Lanlan
    2015 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), 2015, : 334 - 339
  • [26] Vibration signal demodulation and bearing fault detection: A clustering-based segmentation method
    Hou, Shumin
    Liang, Ming
    Zhang, Yi
    Li, Chuan
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART C-JOURNAL OF MECHANICAL ENGINEERING SCIENCE, 2014, 228 (11) : 1888 - 1899
  • [27] A Clustering-based Segmentation Method for Vibration Signal Demodulation and Bearing Fault Detection
    Liu, Shao-Peng
    Hou, Shu-Min
    Li, You-Rong
    INTERNATIONAL CONFERENCE ON MECHANISM SCIENCE AND CONTROL ENGINEERING (MSCE 2014), 2014, : 537 - 542
  • [28] A clustering-based method for unsupervised intrusion detections
    Jiang, SY
    Song, XY
    Wang, H
    Han, JJ
    Li, QH
    PATTERN RECOGNITION LETTERS, 2006, 27 (07) : 802 - 810
  • [29] Fuzzy clustering-based on aggregate attribute method
    Wang, Jia-Wen
    Cheng, Ching-Hsue
    ADVANCES IN APPLIED ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, 4031 : 478 - 487
  • [30] Clustering-based method for data envelopment analysis
    Najadat, H
    Nygard, K
    Schesvold, D
    MSV '05: Proceedings of the 2005 International Conference on Modeling, Simulation and Visualization Methods, 2005, : 255 - 261