Early DDoS Detection Based on Data Mining Techniques

被引:0
|
作者
Xylogiannopoulos, Konstantinos [1 ]
Karampelas, Panagiotis
Alhajj, Reda [1 ]
机构
[1] Univ Calgary, Calgary, AB T2N 1N4, Canada
关键词
ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past few years, internet has experienced a rapid growth in users and services. This led to an increase of different type of cyber-crimes. One of the most important is the Distributed Denial of Service (DDoS) attack, which someone can unleash through many different isolated hosts and make a system to shut down due to resources exhaustion. The importance of the problem can be easily identified due to the huge number of references found in literature trying to detect and prevent such attacks. In the current paper, a novel method based on a data mining technique is introduced in order to early warn the network administrator of a potential DDoS attack. The method uses the advanced All Repeated Patterns Detection (ARPaD) Algorithm, which allows the detection of all repeated patterns in a sequence. The proposed method can give very fast results regarding all IP prefixes in a sequence of hits and, therefore, warn the network administrator if a potential DDoS attack is under development. Based on several experiments conducted, it has been proven experimentally the importance of the method for the detection of a DDoS attack since it can detect a potential DDoS attack at the beginning and before it affects the system.
引用
收藏
页码:190 / 199
页数:10
相关论文
共 50 条
  • [1] The effectiveness of data mining techniques in the detection of DDoS attacks
    Czyczyn-Egird, Daniel
    Wojszczyk, Rafal
    DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, 2018, 620 : 53 - 60
  • [2] A DDOS Intrusion Detection Method Based On Data Mining
    Tian Jun-feng
    Pang Tao
    Du Rui-zhong
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 42 - 46
  • [3] DDoS Attacks Detection in Cloud Computing Using Data Mining Techniques
    Borisenko, Konstantin
    Smirnov, Andrey
    Novikova, Evgenia
    Shorov, Andrey
    ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS, 2016, 9728 : 197 - 211
  • [4] Data Mining Techniques for Early Detection of Breast Cancer
    Cruz, Maria Ines
    Bernardino, Jorge
    KDIR: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON KNOWLEDGE DISCOVERY, KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT - VOL 1: KDIR, 2019, : 434 - 441
  • [5] A combined data mining approach for DDoS attack detection
    Kim, M
    Na, H
    Chae, K
    Bang, H
    Na, J
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 943 - 950
  • [6] An Overview of Intrusion Detection Based on Data Mining Techniques
    Wankhade, Kapil
    Patka, Sadia
    Thool, Ravinrda
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 626 - 629
  • [7] Early Detection of Numerical Typing Errors Using Data Mining Techniques
    Wang, Shouyi
    Lin, Cheng-Jhe
    Wu, Changxu
    Chaovalitwongse, Wanpracha Art
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2011, 41 (06): : 1199 - 1212
  • [8] Assessing the Feasibility of Data Mining Techniques for Early Liver Cancer Detection
    Kuo, Mu-Hsing
    Hung, Chang-Mao
    Barnett, Jeff
    Pinheiro, Fabiola
    QUALITY OF LIFE THROUGH QUALITY OF INFORMATION, 2012, 180 : 584 - 588
  • [9] Handover detection approach based on trajectory data mining techniques
    Han, Nan
    Qiao, Shaojie
    Liu, Dunhu
    Ding, Peng
    Zhang, Yongqing
    Xiong, Xi
    Wang, Mengran
    Gutierrez, Louis Alberto
    JOURNAL OF ENGINEERING-JOE, 2018, (16): : 1534 - 1537
  • [10] Overview of Data Mining Based Adaptive Intrusion Detection Techniques
    Liu, Yangbin
    Shi, Liang
    Wang, Beizhan
    Wang, Panhong
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 702 - 706