Early DDoS Detection Based on Data Mining Techniques

被引:0
|
作者
Xylogiannopoulos, Konstantinos [1 ]
Karampelas, Panagiotis
Alhajj, Reda [1 ]
机构
[1] Univ Calgary, Calgary, AB T2N 1N4, Canada
来源
INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS | 2014年 / 8501卷
关键词
ATTACKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past few years, internet has experienced a rapid growth in users and services. This led to an increase of different type of cyber-crimes. One of the most important is the Distributed Denial of Service (DDoS) attack, which someone can unleash through many different isolated hosts and make a system to shut down due to resources exhaustion. The importance of the problem can be easily identified due to the huge number of references found in literature trying to detect and prevent such attacks. In the current paper, a novel method based on a data mining technique is introduced in order to early warn the network administrator of a potential DDoS attack. The method uses the advanced All Repeated Patterns Detection (ARPaD) Algorithm, which allows the detection of all repeated patterns in a sequence. The proposed method can give very fast results regarding all IP prefixes in a sequence of hits and, therefore, warn the network administrator if a potential DDoS attack is under development. Based on several experiments conducted, it has been proven experimentally the importance of the method for the detection of a DDoS attack since it can detect a potential DDoS attack at the beginning and before it affects the system.
引用
收藏
页码:190 / 199
页数:10
相关论文
共 50 条
  • [41] Data mining for intrusion detection: Techniques, applications and systems
    Pei, H
    Upadhyaya, SJ
    Farooq, F
    Govindaraju, V
    20TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2004, : 877 - 877
  • [42] Anomaly Detection Techniques in Data Mining-A Review
    Lakshmi, K. N.
    Neema, N.
    Muddasir, N. Mohammed
    Prashanth, M., V
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 799 - 804
  • [43] A Survey on Malware Detection Using Data Mining Techniques
    Ye, Yanfang
    Li, Tao
    Adjeroh, Donald
    Iyengar, S. Sitharama
    ACM COMPUTING SURVEYS, 2017, 50 (03)
  • [44] Application of image data mining techniques in fire detection
    Li, Ting
    DCABES 2006 Proceedings, Vols 1 and 2, 2006, : 671 - 672
  • [45] Data Mining Techniques for Intrusion Detection and Prevention System
    Chalak, Ashok
    Harale, Naresh D.
    Bhosale, Rohini
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (08): : 200 - 203
  • [46] Survey on Anomaly Detection using Data Mining Techniques
    Agrawal, Shikha
    Agrawal, Jitendra
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 708 - 713
  • [47] Data mining techniques for the detection of fraudulent financial statements
    Kirkos, Efstathios
    Spathis, Charalambos
    Manolopoulos, Yannis
    EXPERT SYSTEMS WITH APPLICATIONS, 2007, 32 (04) : 995 - 1003
  • [48] Integrating data mining techniques with intrusion detection methods
    Mukkamala, R
    Gagnon, J
    Jajodia, S
    RESEARCH ADVANCES IN DATABASE AND INFORMATION SYSTEMS SECURITY, 2000, 43 : 33 - 46
  • [49] A comparative study for outlier detection techniques in data mining
    Abu Bakar, Zuriana
    Mohemad, Rosmayati
    Ahmad, Akbar
    Deris, Mustafa Mat
    2006 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2006, : 360 - +
  • [50] An application of data mining techniques on earnings management detection
    Hsieh, Yung-Ming (armin@scu.edu.tw), 2016, ICIC Express Letters Office (07):