Uneingeschränkter Zugang

Advancing DDoS attack detection with hybrid deep learning: integrating convolutional neural networks, PCA, and vision transformers

, , , ,  und   
17. Dez. 2024

Zitieren
COVER HERUNTERLADEN

F. Laghrissi, S. Douzi, K. Douzi, and B. Hssina, “Intrusion detection systems using long short-term memory (LSTM),” Journal of Big Data, vol. 8, no. 1, 2021. LaghrissiF. DouziS. DouziK. HssinaB. “Intrusion detection systems using long short-term memory (LSTM),” Journal of Big Data 8 1 2021 Search in Google Scholar

“The world’s most valuable resource is no longer oil, but data,” The Economist, [Accessed: 05-Mar-2023]. “The world’s most valuable resource is no longer oil, but data,” The Economist [Accessed: 05-Mar-2023]. Search in Google Scholar

M. Macas and C. Wu, “Review: Deep learning methods for cyber security and intrusion detection systems,” in 2020 IEEE Latin-American Conference on Communications (LATINCOM). MacasM. WuC. “Review: Deep learning methods for cyber security and intrusion detection systems,” in 2020 IEEE Latin-American Conference on Communications (LATINCOM) Search in Google Scholar

A. Rudskoy, A. Borovkov, P. Romanov, and O. Kolosova, “Reducing global risks in the process of transition to the digital economy,” IOP Conference Series: Materials Science and Engineering, vol. 497, p. 012088, 2019. RudskoyA. BorovkovA. RomanovP. KolosovaO. “Reducing global risks in the process of transition to the digital economy,” IOP Conference Series: Materials Science and Engineering 497 012088 2019 Search in Google Scholar

A. Kushairi, R. Singh, and M. Ong-Abdullah, “The oil palm industry in malaysia: Thriving with transformative technologies,” Journal of Oil Palm Research, vol. 29, no. 4, pp. 431–439, 2017. KushairiA. SinghR. Ong-AbdullahM. “The oil palm industry in malaysia: Thriving with transformative technologies,” Journal of Oil Palm Research 29 4 431 439 2017 Search in Google Scholar

A. Alsirhani, S. Sampalli, and P. Bodorik, “Ddos attack detection system: Utilizing classification algorithms with apache spark,” in 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018. AlsirhaniA. SampalliS. BodorikP. “Ddos attack detection system: Utilizing classification algorithms with apache spark,” in 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2018 Search in Google Scholar

O. A. Wahab, J. Bentahar, H. Otrok, and A. Mourad, “Optimal load distribution for the detection of vm-based ddos attacks in the cloud,” IEEE Transactions on Services Computing, vol. 13, no. 1, pp. 114–129, 2020. WahabO. A. BentaharJ. OtrokH. MouradA. “Optimal load distribution for the detection of vm-based ddos attacks in the cloud,” IEEE Transactions on Services Computing 13 1 114 129 2020 Search in Google Scholar

A. Yao, G. Li, X. Li, F. Jiang, J. Xu, and X. Liu, “Differential privacy in edge computing-based smart city applications: Security issues, solutions, and future directions,” Array, 2023. YaoA. LiG. LiX. JiangF. XuJ. LiuX. “Differential privacy in edge computing-based smart city applications: Security issues, solutions, and future directions,” Array 2023 Search in Google Scholar

R. V. Deshmukh and K. K. Devadkar, “Understanding ddos attack & its effect in cloud environment,” Procedia Computer Science, vol. 49, pp. 202–210, 2015. DeshmukhR. V. DevadkarK. K. “Understanding ddos attack & its effect in cloud environment,” Procedia Computer Science 49 202 210 2015 Search in Google Scholar

D. E. Denning, “An intrusion-detection model,” IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222–232, 1987. DenningD. E. “An intrusion-detection model,” IEEE Transactions on Software Engineering SE-13 2 222 232 1987 Search in Google Scholar

J. A. Perez-Diaz, I. A. Valdovinos, K.-K. R. Choo, and D. Zhu, “A flexible sdn-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning,” IEEE Access, vol. 8, pp. 155 859–155 872, 2020. Perez-DiazJ. A. ValdovinosI. A. ChooK.-K. R. ZhuD. “A flexible sdn-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning,” IEEE Access 8 155 859 155 872 2020 Search in Google Scholar

M. S. Elsayed, N.-A. Le-Khac, S. Dev, and A. D. Jurcut, “Ddosnet: A deep-learning model for detecting network attacks,” in 2020 IEEE 21st International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2020. ElsayedM. S. Le-KhacN.-A. DevS. JurcutA. D. “Ddosnet: A deep-learning model for detecting network attacks,” in 2020 IEEE 21st International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM) 2020 Search in Google Scholar

P. Verma, S. Tapaswi, and W. W. Godfrey, “An adaptive threshold-based attribute selection to classify requests under ddos attack in cloud-based systems,” Arabian Journal for Science and Engineering, vol. 45, no. 4, pp. 2813–2834, 2020. VermaP. TapaswiS. GodfreyW. W. “An adaptive threshold-based attribute selection to classify requests under ddos attack in cloud-based systems,” Arabian Journal for Science and Engineering 45 4 2813 2834 2020 Search in Google Scholar

Rusyaidi, S. Jaf, and Z. Ibrahim, “Detecting distributed denial of service in network traffic with deep learning,” International Journal of Advanced Computer Science and Applications, vol. 13, pp. 34–41, 2022. Rusyaidi JafS. IbrahimZ. “Detecting distributed denial of service in network traffic with deep learning,” International Journal of Advanced Computer Science and Applications 13 34 41 2022 Search in Google Scholar

“Ddos evaluation dataset (cicddos2019),” 2019, [Accessed: 03-05-2023]. [Online]. Available: https://www.unb.ca/cic/datasets/ddos-2019.html “Ddos evaluation dataset (cicddos2019),” 2019 [Accessed: 03-05-2023]. [Online]. Available: https://www.unb.ca/cic/datasets/ddos-2019.html Search in Google Scholar

“What was the largest ddos attack of all time?” [Accessed: 05-03-2023]. [Online]. Available: https://www.cloudflare.com/learning/ddos/famous-ddos-attacks “What was the largest ddos attack of all time?” [Accessed: 05-03-2023]. [Online]. Available: https://www.cloudflare.com/learning/ddos/famous-ddos-attacks Search in Google Scholar

“Eight-hour DDoS attack struck AWS customers,” 2019, [Accessed: 25-Mar-2023]. [Online]. Available: https://www.darkreading.com/cloud/eight-hour-ddos-attack-struckaws-customers/d/d-id/1336165 “Eight-hour DDoS attack struck AWS customers,” 2019 [Accessed: 25-Mar-2023]. [Online]. Available: https://www.darkreading.com/cloud/eight-hour-ddos-attack-struckaws-customers/d/d-id/1336165 Search in Google Scholar

M. Alazab, S.-H. Hong, and J. Ng, “Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in australia,” Future Generation Computer Systems, vol. 116, pp. 22–29, 2021. AlazabM. HongS.-H. NgJ. “Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in australia,” Future Generation Computer Systems 116 22 29 2021 Search in Google Scholar

R. Chalapathy and S. Chawla, “Deep learning for anomaly detection: A survey,” 2019. ChalapathyR. ChawlaS. “Deep learning for anomaly detection: A survey,” 2019 Search in Google Scholar

Y. Jia, F. Zhong, A. Alrawais, B. Gong, and X. Cheng, “Flow-guard: an intelligent edge defense mechanism against ioi ddos attacks,” IEEE Internet of Things Journal, no. 1, 2020. JiaY. ZhongF. AlrawaisA. GongB. ChengX. “Flow-guard: an intelligent edge defense mechanism against ioi ddos attacks,” IEEE Internet of Things Journal 1 2020 Search in Google Scholar

Y. Xiao, C. Xing, T. Zhang, and Z. Zhao, “An intrusion detection model based on feature reduction and convolutional neural networks,” IEEE Access, vol. 7, pp. 42 210–42 219, 2019. XiaoY. XingC. ZhangT. ZhaoZ. “An intrusion detection model based on feature reduction and convolutional neural networks,” IEEE Access 7 42 210 42 219 2019 Search in Google Scholar

B. Hussain, Q. Du, B. Sun, and Z. Han, “Deep learning-based ddos-attack detection for cyber–physical system over 5g network,” IEEE Transactions on Industrial Informatics, vol. 17, no. 2, pp. 860–870, 2021. HussainB. DuQ. SunB. HanZ. “Deep learning-based ddos-attack detection for cyber–physical system over 5g network,” IEEE Transactions on Industrial Informatics 17 2 860 870 2021 Search in Google Scholar

R. Doriguzzi-Corin, S. Millar, S. Scott-Hayward, J. Martinezdel Rincon, and D. Siracusa, “Lucid: A practical, lightweight deep learning solution for ddos attack detection,” IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 876–889, 2020. Doriguzzi-CorinR. MillarS. Scott-HaywardS. Martinezdel RinconJ. SiracusaD. “Lucid: A practical, lightweight deep learning solution for ddos attack detection,” IEEE Transactions on Network and Service Management 17 2 876 889 2020 Search in Google Scholar

L. Wang and Y. Liu, “A ddos attack detection method based on information entropy and deep learning in sdn,” in 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2020. WangL. LiuY. “A ddos attack detection method based on information entropy and deep learning in sdn,” in 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2020 Search in Google Scholar

L. Ma, Y. Chai, L. Cui, D. Ma, Y. Fu, and A. Xiao, “A deep learning-based ddos detection framework for internet of things,” in 2020 IEEE International Conference on Communications (ICC), 2020. MaL. ChaiY. CuiL. MaD. FuY. XiaoA. “A deep learning-based ddos detection framework for internet of things,” in 2020 IEEE International Conference on Communications (ICC) 2020 Search in Google Scholar

J. Kim, J. Kim, H. L. Thu, and H. Kim, “Long short-term memory recurrent neural network classifier for intrusion detection,” in 2016 International Conference on Platform Technology and Service (PlatCon), 2016. KimJ. KimJ. ThuH. L. KimH. “Long short-term memory recurrent neural network classifier for intrusion detection,” in 2016 International Conference on Platform Technology and Service (PlatCon) 2016 Search in Google Scholar

S. Naseer et al., “Enhanced network anomaly detection based on deep neural networks,” IEEE Access, vol. 6, pp. 48 231–48 246, 2018. NaseerS. “Enhanced network anomaly detection based on deep neural networks,” IEEE Access 6 48 231 48 246 2018 Search in Google Scholar

Ö. Aslan, “A methodology to detect distributed denial of service attacks,” Informatics Tech Journal, vol. 15, no. 2, pp. 149–158, 2022. AslanÖ. “A methodology to detect distributed denial of service attacks,” Informatics Tech Journal 15 2 149 158 2022 Search in Google Scholar

M. V. Gaur and R. Kumar, “MLSTM: Multiclass long short-term memory based approach for detection of ddos attacks,” Philippine Statistician, vol. 71, no. 3s2, pp. 1375–1394, 2022. GaurM. V. KumarR. “MLSTM: Multiclass long short-term memory based approach for detection of ddos attacks,” Philippine Statistician 71 3s2 1375 1394 2022 Search in Google Scholar

D. Kumar, R. K. Pateriya, R. K. Gupta, V. Dehalwar, and A. Sharma, “Ddos detection using deep learning,” Procedia Computer Science, vol. 218, pp. 2420–2429, 2023. KumarD. PateriyaR. K. GuptaR. K. DehalwarV. SharmaA. “Ddos detection using deep learning,” Procedia Computer Science 218 2420 2429 2023 Search in Google Scholar

Sowmya and T. M. Anita, “An intelligent hybrid gapi feature selection technique for network intrusion detection systems,” International Journal of Intelligent Systems and Applications in Engineering, vol. 11, no. 7s, pp. 718–731, 2023. Sowmya AnitaT. M. “An intelligent hybrid gapi feature selection technique for network intrusion detection systems,” International Journal of Intelligent Systems and Applications in Engineering 11 7s 718 731 2023 Search in Google Scholar

L. Y. Ahmed, M. M. Hamdy, and H. Mahmoud, “Improved ddos detection utilizing deep neural networks and feedforward neural networks as auto encoder,” Future Internet, vol. 14, no. 8, pp. 240–248, 2022. AhmedL. Y. HamdyM. M. MahmoudH. “Improved ddos detection utilizing deep neural networks and feedforward neural networks as auto encoder,” Future Internet 14 8 240 248 2022 Search in Google Scholar

“Ddos evaluation dataset (cicddos2019),” 2019, [Accessed: 25-03-2023]. [Online]. Available: https://www.unb.ca/cic/datasets/ddos-2019.html “Ddos evaluation dataset (cicddos2019),” 2019 [Accessed: 25-03-2023]. [Online]. Available: https://www.unb.ca/cic/datasets/ddos-2019.html Search in Google Scholar

M. A. Ferrag, L. Shu, H. Djallel, and K.-K. R. Choo, “Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0,” Electronics (Basel), vol. 10, no. 11, p. 1257, 2021. FerragM. A. ShuL. DjallelH. ChooK.-K. R. “Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0,” Electronics (Basel) 10 11 1257 2021 Search in Google Scholar

Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
1 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Technik, Einführungen und Gesamtdarstellungen, Technik, andere