Affiliation:
1. Department of InfoComm Networks, Faculty of Management Science and Informatics, University of Zilina, 010 26 Zilina, Slovakia
Abstract
As part of the research in the recently ended project SANET II, we were trying to create a new machine-learning system without a teacher. This system was designed to recognize DDoS attacks in real time, based on adaptation to real-time arbitrary traffic and with the ability to be embedded into the hardware implementation of network probes. The reason for considering this goal was our hands-on experience with the high-speed SANET network, which interconnects Slovak universities and high schools and also provides a connection to the Internet. Similar to any other public-facing infrastructure, it is often the target of DDoS attacks. In this article, we are extending our previous research, mainly by dealing with the use of various statistical parameters for DDoS attack detection. We tested the coefficients of Variation, Kurtosis, Skewness, Autoregression, Correlation, Hurst exponent, and Kullback–Leibler Divergence estimates on traffic captures of different types of DDoS attacks. For early machine recognition of the attack, we have proposed several detection functions that use the response of the investigated statistical parameters to the start of a DDoS attack. The proposed detection methods are easily implementable for monitoring actual IP traffic.
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference65 articles.
1. Norton, N. (2023, November 10). What Is a DDoS and What Can You Do about Them?. Available online: https://us.norton.com/blog/emerging-threats/what-is-a-ddos-attack-30sectech-by-norton.
2. Anomaly detection in IP networks;Thottan;IEEE Trans. Signal Process.,2003
3. Bhattacharyya, D.K., and Kalita, J.K. (2016). DDos Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance, CRC Press.
4. Lemeshko, O., Papan, J., Yeremenko, O., Yevdokymenko, M., and Segeč, P. (2021). Research and Development of Delay-Sensitive Routing Tensor Model in IoT Core Networks. Sensors, 21.
5. Drozdova, M., Bridova, I., Uramova, J., and Moravcik, M. (2020, January 12–13). Private cloud security architecture. Paper presented at the ICETA 2020. Proceedings of the 18th IEEE International Conference on Emerging eLearning Technologies and Applications, Košice, Slovenia.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献