Detection of LDDoS Attacks Based on TCP Connection Parameters

03/12/2019
by   Michael Siracusano, et al.
0

Low-rate application layer distributed denial of service (LDDoS) attacks are both powerful and stealthy. They force vulnerable webservers to open all available connections to the adversary, denying resources to real users. Mitigation advice focuses on solutions that potentially degrade quality of service for legitimate connections. Furthermore, without accurate detection mechanisms, distributed attacks can bypass these defences. A methodology for detection of LDDoS attacks, based on characteristics of malicious TCP flows, is proposed within this paper. Research will be conducted using combinations of two datasets: one generated from a simulated network, the other from the publically available CIC DoS dataset. Both contain the attacks slowread, slowheaders and slowbody, alongside legitimate web browsing. TCP flow features are extracted from all connections. Experimentation was carried out using six supervised AI algorithms to categorise attack from legitimate flows. Decision trees and k-NN accurately classified up to 99.99 low false positive and false negative rates, demonstrating the potential of AI in LDDoS detection.

READ FULL TEXT
research
03/28/2019

DDoS Attack Detection Method Based on Network Abnormal Behavior in Big Data Environment

Distributed denial of service (DDoS) attack becomes a rapidly growing pr...
research
08/22/2018

DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning

Flow correlation is the core technique used in a multitude of deanonymiz...
research
09/15/2021

Modern Cybersecurity Solution using Supervised Machine Learning

Cybersecurity is essential, and attacks are rapidly growing and getting ...
research
08/26/2019

SynGAN: Towards Generating Synthetic Network Attacks using GANs

The rapid digital transformation without security considerations has res...
research
05/25/2020

The never ending war in the stack and the reincarnation of ROP attacks

Return Oriented Programming (ROP) is a technique by which an attacker ca...
research
01/08/2018

How to find a GSMem malicious activity via an AI approach

This paper investigates the following problem: how to find a GSMem malic...
research
11/02/2018

An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets

Botnets (networks of compromised computers) are often used for malicious...

Please sign up or login with your details

Forgot password? Click here to reset