A Novel Hybrid Approach for Detection of DDoS Attack
- 272 Downloads
Abstract
The Distributed denial of service (DDoS), special type of denial of service attack, has become one of the major threats to the internet. Assailants perform DDoS assault by coordinating countless sources to send futile activity to the casualty in this manner upsetting typical administrations. The risk of DDoS assaults has turned out to be much more serious as aggressors can trade off a colossal number of PCs by utilizing vulnerabilities in prominent working frameworks. With the Internet of Things in place the DDoS attack will have an enormous attack surfaces available to unleash its full potential. Due to its nature, DDoS prevention is not guaranteed. Attack detection be the next step of defense. The developed system uses hybrid approach, that is, combining two approaches, namely misuse-based and anomaly-based detection. The results achieved by the developed system are discussed in this paper.
Keywords
DDoS attack Anomaly-based detection Misuse-based detection Hybrid detection approachReferences
- 1.Nazrul, H., Dhruba, B., Jugal, K.: A novel measure for low-rate and high- rate DDoS attack detection using multivariate data analysis. In: IEEE COMSNETS 2016-Poster Track (2016)Google Scholar
- 2.Zhiyuan, T., Aruna, J., Xiangjian, H., Priyadarsi, N., Ren, P.L.: A system for Denial-of-Service Attack detection based on multivariate correlation analysis. IEEE Trans. Parallel Distrib. Syst. 25(2), 447–456 (2014)CrossRefGoogle Scholar
- 3.Komal, M., Pramod, G.: A Survey on Effective way of Detecting Denial-of-Service attack using Multivariate Correlation Analysis. iCATccT (2015)Google Scholar
- 4.Özge, C., Saliha, B., Güneş, K.: Hybrid Intrusion Detection System for DDoS Attacks, Journal of Electrical and Computer Engineering (2015)Google Scholar
- 5.Alan, S., Richard, O., Tomasz, R.: Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing 172, 385–393 (2016)CrossRefGoogle Scholar
- 6.İlker, O., Richard, B.: Cusum-Entropy: An efficient method for DDoS attack detection. IEEE (2016)Google Scholar
- 7.Xi, Q., Tongge, X., Chao, W.: DDoS Attack Detection using Flow Entropy and Clustering Technique. ICCIS (2015)Google Scholar
- 8.Dhruba, B., Jugal, K.: Network Anomaly Detection-Machine Learning perspectiveGoogle Scholar
- 9.Manohar, M.T.B., Jyothi, M.E., Rajani, M.B., Kumar, M.I.R.: A Novel Entropy Based Detection of DDoS AttacksGoogle Scholar
- 10.Félix, I., Tanja, Z.: Analysis of Network Traffic Features for Anomaly Detection. Springer (2015)Google Scholar
- 11.Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection DatasetsGoogle Scholar
- 12.Manjari, S., Sekhar, K.R.: DDoS Counter Measures Based on Snort’s detection system. IJDCST (2013)Google Scholar
- 13.KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
- 14.MIT DARPA (2000). http://www.ll.mit.edu/ideval/data/2000data.html
- 15.Geoffrey, M.: Mahalanobis Distance (1999)Google Scholar