Early DDoS Detection Based on Data Mining Techniques

被引:0
|
作者
Xylogiannopoulos, Konstantinos [1 ]
Karampelas, Panagiotis
Alhajj, Reda [1 ]
机构
[1] Univ Calgary, Calgary, AB T2N 1N4, Canada
来源
INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS | 2014年 / 8501卷
关键词
ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past few years, internet has experienced a rapid growth in users and services. This led to an increase of different type of cyber-crimes. One of the most important is the Distributed Denial of Service (DDoS) attack, which someone can unleash through many different isolated hosts and make a system to shut down due to resources exhaustion. The importance of the problem can be easily identified due to the huge number of references found in literature trying to detect and prevent such attacks. In the current paper, a novel method based on a data mining technique is introduced in order to early warn the network administrator of a potential DDoS attack. The method uses the advanced All Repeated Patterns Detection (ARPaD) Algorithm, which allows the detection of all repeated patterns in a sequence. The proposed method can give very fast results regarding all IP prefixes in a sequence of hits and, therefore, warn the network administrator if a potential DDoS attack is under development. Based on several experiments conducted, it has been proven experimentally the importance of the method for the detection of a DDoS attack since it can detect a potential DDoS attack at the beginning and before it affects the system.
引用
收藏
页码:190 / 199
页数:10
相关论文
共 50 条
  • [31] Anomaly Intrusion Detection Based Upon Data Mining Techniques and Fuzzy Logic
    Yu, Yingbing
    Wu, Han
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 514 - 517
  • [32] Data warehousing and data mining techniques for intrusion detection systems
    Anoop Singhal
    Sushil Jajodia
    Distributed and Parallel Databases, 2006, 20 : 149 - 166
  • [33] Data warehousing and data mining techniques for intrusion detection systems
    Singhal, Anoop
    Jajodia, Sushil
    DISTRIBUTED AND PARALLEL DATABASES, 2006, 20 (02) : 149 - 166
  • [34] Detection Techniques of DDoS Attacks: A Survey
    Kamboj, Priyanka
    Trivedi, Munesh Chandra
    Yadav, Virendra Kumar
    Singh, Vikash Kumar
    2017 4TH IEEE UTTAR PRADESH SECTION INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ELECTRONICS (UPCON), 2017, : 675 - 679
  • [35] Using Opinion Mining Techniques for Early Crisis Detection
    Iftene, Adrian
    Ginsca, Alexandru-Lucian
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2012, 7 (05) : 857 - 864
  • [36] Classification of Intrusion Detection Using Data Mining Techniques
    Sahani, Roma
    Shatabdinalini
    Rout, Chinmayee
    Badajena, J. Chandrakanta
    Jena, Ajay Kumar
    Das, Himansu
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 753 - 764
  • [37] Outlier detection with data mining techniques and statistical methods
    Orellana, Marcos
    Cedillo, Priscila
    ENFOQUE UTE, 2020, 11 (01): : 56 - 67
  • [38] Combination of Data Mining Techniques for Intrusion Detection System
    Elekar, Kailas Shivshankar
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [39] Detection of accounting fraud utilizing Data Mining Techniques
    Baez Hernandez, Alexander
    REVISTA PUBLICANDO, 2015, 2 (05): : 103 - 113
  • [40] Application of Data Mining Techniques for Defect Detection and Classification
    Prakash, B. V. Ajay
    Ashoka, D. V.
    Aradya, V. N. Manjunath
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1, 2015, 327 : 387 - 395