A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment
<p>Distributed Denial of Service (DDoS) attack. DNS: domain name servers; NTP: network time protocol; DVR: digital video recorders; IoT: Internet of Things.</p> "> Figure 2
<p>Domain name servers (DNS) request packet.</p> "> Figure 3
<p>Description of 4 classes features.</p> "> Figure 4
<p>Deep DRDoS detection model based on host-based DRDoS threat index (HDTI).</p> "> Figure 5
<p>Experiment result of <math display="inline"><semantics> <mrow> <msub> <mi>b</mi> <mi>r</mi> </msub> <mo>=</mo> <mn>1</mn> <mo>,</mo> <msub> <mi>b</mi> <mi>q</mi> </msub> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>. SVM: support vector machine; kNN: k nearest neighbor.</p> "> Figure 6
<p>Experiment result of <math display="inline"><semantics> <mrow> <msub> <mi>b</mi> <mi>r</mi> </msub> <mo>=</mo> <mn>20</mn> <mo>,</mo> <msub> <mi>b</mi> <mi>q</mi> </msub> <mo>=</mo> <mn>500</mn> </mrow> </semantics></math>.</p> "> Figure 7
<p>Experiment result of <math display="inline"><semantics> <mrow> <msub> <mi>b</mi> <mi>r</mi> </msub> <mo>=</mo> <mn>100</mn> <mo>,</mo> <msub> <mi>b</mi> <mi>q</mi> </msub> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>.</p> "> Figure 8
<p>The proposed defense method when eliminate the upstream and MUD.</p> "> Figure 9
<p>The proposed defense method when eliminate the downstream and MUD.</p> "> Figure 10
<p>The attack flow elimination rate with different sample time.</p> "> Figure 11
<p>Scan and Probe over the whole IPv4 space. At the time we scanned, there’re 2,247,438 servers with TCP port 11211 open, and 1466 servers among them actually run memcached service and responses to UDP requests.</p> "> Figure 12
<p>Performance of proposed method when generalized to memcached DRDoS.</p> ">
Abstract
:1. Introduction
2. Related Works
3. Analysis of General Type DRDoS Attack
3.1. IP Layer
3.2. Transport Layer
4. The Proposed Method
4.1. Extract Features at Different Layers
- When attacker initiates the DRDoS attack, for some , there would be a large number of request packets and response packets from the reflectors. Thus we count the number of request packets and response packets for each source IP and destination IP respectively. And for request packets to the , we use a dictionary with its key denotes the source IP, and denote the corresponding number of request packets declared from the . Whereas, for the response packets from the , we use with its key denotes the destination IP, and denote the corresponding number of response packets that send to the .At the end of each sample interval, we calculate the amount of request and response packets respectively for each IP.
- For request and response packets, we calculate the volume per unit time of these packets with the same source IP and destination IP separately. We define the length of each packet as , and for request packets, we use a dictionary with source IP as its key, the corresponding total length from that source IP as its value. Meanwhile, for the response packet, a dictionary is defined with destination IP as its key.Then we could calculate the volume per unit time for each IP in M as Equations (5) and (6).An abnormally gigantic value of shows that there’s possibly a DRDoS attack, because some requires a larger size of request packets to gain more amplification for response flow from reflectors, thus we extract this basic feature from the request packets to . And for , it is obviously that this is the key point of the DRDoS attack. If is an abnormally large value, it indicates that this is under DRDoS attack.
- Because each IP packet occupies one source or one destination port of a machine at a time, we are also taking the amount of ports into consideration. Likely, we use a dictionary with source IP as its key, the corresponding value is a set which represents the unique source port from . Meanwhile, for the response packet, a dictionary is defined similarly.Then we could calculate and as Equations (8) and (9).We use and as another two basic features in the HDTI, because when attacker initiate the DRDoS attack, and to make the DRDoS attack effective and valid, the attacker would send request packets to as much as possible, which leads to that there are many request packets been sent the same time, and each packet requires a unique source port number, thus the would be an abnormally large number. And based on the principles of TCP/IP, a response packet’s destination port number is the same source port number of the corresponding request packet, which suggests that would be an abnormally large number as well if is under DRDoS attack.
4.2. Analysis of the Feature Value
- Attack Source. A relatively abnormal growth among , and can be observed. By applying the features to the deep forest’s classifier, we would be able to detect the upstream of the attack flow. With the result from the classifier, we can drop those upstream packets before they can reach to the reflectors using differentiated service, in case of reducing the number of the abnormal packets to reflectors.
- Intended Victim. An abnormally enormous value among , and can be observed. Moreover, the closer to the intended victim, the larger these components extracted in the nodes are, as the attack flow clustering from reflectors to the intended victim. As an answer to this situation, the detection mechanism using random forest deployed on the intended victim’s side could alert and activate defense moves by eliminating the downstream of the attack flow towards the intended victim.
- Internal Nodes in the Internet. The nodes in the internet can obtain both upstream from attack flow and send downstream attack flow, which means that both streams can be observed and extracted. We are calling the flow with these features mentioned as mixed upstream and downstream (MUD). When attack flow lies in the MUD, we can still recognize the threats by classifying this with normal flow with random forest, and initiate differentiated service to drop the attack packets, so that the attack flow could be reduced, and the network load could be relieved.
4.3. Deep Forest Based DRDoS Detection and Defense Method
- Sample the train set m times, obtaining the sampling set consists of m sample.
- Train the -th model of decision tree with randomly selecting features.
- The most voted class of T weak learners will be selected as the final prediction.
- If the source IP of an abnormal request packet was identified as upstream, the differentiated service drops it.
- If an abnormal response packet with its destination IP identified as downstream, it would be also getting filtered.
- Whether the request packet length exceeds or not.And for the demonstration of empirically rules, we also add one rule for response packet. This rule is used for avoiding the fluctuation of the normal network flow.
- We use a dictionary to store the total filtered length of destination IP . If the response packet length exceeds , then check whether the total transferred length of the corresponding IP exceeds .
Algorithm 1. Deep Forest based DRDoS Detection and Defense | |
Input: | Training network flow , network flow to be detected, rule set |
1: | Extract HDTi features from with Equations (2), (4) and (6) |
2: | Training deep DRDoS detection and defense forest model with extracted HDTI features |
3: | CNF of |
4: | |
5: | for each sampling do |
6: | for each VSD packet do |
7: | if is a request packet then |
8: | if Upstream IP Set then |
9: | if proposition is true for then |
10: | drop this packet |
11: | end if |
12: | end if |
13: | |
14: | end if |
15: | if is a response packet then |
16: | if Downstream IP Set then |
17: | if proposition is true for then |
18: | drop this packet |
19: | |
20: | end if |
21: | end if |
22: | |
23: | end if |
24: | end for |
25: | for each do |
26: | calculate HDTI feature () for |
27: | identify the type of using the deep DRDoS detection and defense forest model |
28: | if the type of is normal then |
29: | do nothing |
30: | else |
31: | if the type of is Upstream then |
32: | add to Upstream IP Set |
33: | else |
34: | if the type of is Downstream then |
35: | add to Downstream IP Set |
36: | else |
37: | add to both Upstream and Downstream IP Set |
38: | end if |
39: | end if |
40: | end if |
41: | end for |
42: | end for |
43: | return |
4.4. Dataset and Assessment Criterions
- Detection Rate, . This value denotes the probability of the classifier identifies actual DDoS attack flow. is calculated as the number of true negative samples divides the sum of both true negative and false negative samples.
- Missing Rate, . This value represents the probability of the classifier fails to identify actual DDoS attack flow. is calculated as the number of false negative samples divides the sum of both true negative and false negative samples.
- False Alarm Rate, . False alarm rate suggests that the probability of normal users are mistakenly flagged as attackers by the classifier. Correspondingly, it calculates as the number of false positive samples divides the sum of both true positive and false positive samples.
5. Experiment
- Directly inject response packets into the network to validate the differentiated service in the victim side. The bandwidth of our injected response packets is configured as Mbps.
- Inject attacker’s request packets to validate the detection method and differentiate service near the attacker side. If there is any DRDoS request packet passed through our detect method, corresponding response packet will be sent to the victim side. And the bandwidth of our injected request packets is configured as Mbps.
- Inject both request packets and response packets into the network to validate the proposed method when deployed at any node in the network. The bandwidth of our injected response packets is configured as Mbps, and for the request packets, Mbps.
5.1. Experiment Result
5.2. Real-World Experiment with Memcached Service
- We scan over literally the whole IPv4 address space for finding servers with TCP port 11211 opens, which is the default port of memcached service. This takes more than 15 hours on our machine. And we discovered more than 2 million servers opens TCP port 11211.
- Then we probe over the 2 million servers to filter out the server that actually runs the memcached service and responses to UDP requests. And we observed 1466 servers that could be used for initiating the memcached DRDoS attack, as shown in Figure 11.
- In stage 3 we upload the payload to vulnerable servers, the payload is set to about 1 MB. And we actually could upload even larger payload to these servers, for example, 2 MB payload, so that the amplification would get almost doubled again.
- In this attack phase, we send UDP requests to these vulnerable servers for retrieving the payload with source IP spoofed as the intended victim. The length of request UDP packet payload is 20 bytes, thus the amplification is for each request. And to avoid real DRDoS attack, we only send these fake requests to 20 vulnerable servers. Even through, this results in 104 Mbps peak and 90 Mbps average Memcached DRDoS attack flow.
- Then, at around 30th second, we deploy the method we proposed, we observed a huge drop of attack flow in the intended victim, as shown in Figure 12.
6. Conclusions and Future Direction
Author Contributions
Funding
Conflicts of Interest
References
- Vukovic, O.; Dan, G. Security of fully distributed power system state estimation: Detection and mitigation of date integrity attacks. IEEE J. Sel. Areas Commun. 2014, 32, 1500–1508. [Google Scholar] [CrossRef]
- Cloudflare. Available online: https://blog.cloudflare.com/the-daily-ddos-ten-days-of-massive-attacks/ (accessed on 7 May 2018).
- CERT Coordination Center. Results of the Distributed-Systems Intruder Tools Workshop; Software Engineering Institute: Pittsburgh, PA, USA, 1999. [Google Scholar]
- Garber, L. Denial-of-service attacks rip the Internet. Computer 2000, 33, 12–17. [Google Scholar] [CrossRef]
- Kargl, F.; Maier, J.; Weber, M. Protecting web servers from distributed denial of service attacks. In Proceedings of the 10th international conference on World Wide Web, Hong Kong, China, 1–5 May 2005; ACM: New York, NY, USA, 2001; pp. 514–524. [Google Scholar] [Green Version]
- Weiler, N. Honeypots for distributed denial-of-service attacks. In Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Pittsburgh, PA, USA, 12 June 2002. [Google Scholar]
- Cheng, J.; Yin, J.; Liu, Y. DDoS Attack Detection Using IP Address Feature Interaction. In Proceedings of the International Conference on Intelligent NETWORKING and Collaborative Systems, Barcelona, Spain, 4–6 November 2009; IEEE Computer Society: Washington, DC, USA, 2009; pp. 113–118. [Google Scholar]
- Cheng, J.; Zhang, B.; Yin, J. DDoS Attack Detection Using Three-State Partition Based on Flow Interaction. Commun. Comput. Inf. Sci. 2009, 29, 176–184. [Google Scholar]
- Cheng, J.; Yin, J.; Liu, Y. Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion. In Proceedings of the Security Technology, Proceedings of the International Conference, Jeju Island, Korea, 10–12 December 2009; Springer: Berlin/Heidelberg, Germany, 2009; pp. 132–139. [Google Scholar]
- Cheng, J.; Tang, X.; Zhu, X.; Yin, J. Distributed denial of service attack detection based on IP Flow Interaction. In Proceedings of the International Conference on E-Business and E-Government (ICEE), Shanghai, China, 6–8 May 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 1–4. [Google Scholar]
- Zhu, X.; Li, X.; Liu, M.; Zhu, E.; Liu, L.; Cai, Z.; Yin, J.; Gao, W. Localized Incomplete Multiple Kernel k-means. IJCAI 2018, 3271–3277. [Google Scholar] [CrossRef]
- Wang, S.; Liu, Q.; Zhu, E.; Porikli, F.; Yin, J. Hyperparameter selection of one-class support vector machine by self-adaptive data shifting. Pattern Recognit. 2018, 74, 198–211. [Google Scholar] [CrossRef]
- Cheng, J.; Chen, Z.; Tang, X. Adaptive DDoS attack detection method based on multiple-kernel learning. Secur. Commun. Netw. 2018, 2018, 5198685. [Google Scholar] [CrossRef]
- Cheng, J.; Xu, R.; Tang, X. An Abnormal Network Flow Feature Sequence Prediction Approach for DDoS Attacks Detection in Big Data Environment. Comput. Mater. Contin. 2018, 55, 95–119. [Google Scholar]
- Cheng, J.; Zhou, J.; Liu, Q.; Tang, X.; Guo, Y. A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence. Comput. J. 2018, 61, 959–970. [Google Scholar] [CrossRef]
- Cheng, J.; Li, M.; Tang, X.; Sheng, V.S.; Liu, Y.; Guo, W. Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing. Secur. Commun. Netw. 2018, 2018, 6459326. [Google Scholar] [CrossRef]
- Zhang, R.; Cheng, J.; Tang, X.; Liu, Q.; He, X. DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm. In Proceedings of the International Conference on Cloud Computing and Security (ICCCS), Haikou, China, 8–10 June 2018; pp. 654–669. [Google Scholar]
- Manikopoulos, C.; Papavassiliou, S. Network intrusion and fault detection: A statistical anomaly approach. IEEE Commun. Mag. 2002, 40, 76–82. [Google Scholar] [CrossRef]
- Liao, H.; Lin, C.R.; Lin, Y. Intrusion detection system: A comprehensive review. J. Netw. Comput. Appl. 2013, 36, 16–24. [Google Scholar] [CrossRef]
- Garcia-Teodoro, P.; Diaz-Verdejo, J.; Macia-Fernandez, G. Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur. 2009, 28, 18–28. [Google Scholar] [CrossRef]
- Li, J.; Yan, Q.; Chang, V. Internet of Things: Security and privacy in a connected world. Future Gener. Comp. Syst. 2018, 78, 931–932. [Google Scholar] [CrossRef]
- Sun, W.; Cai, Z.; Li, Y.; Liu, F.; Fang, S.; Wang, G. Security and Privacy in the Medical Internet of Things: A Review. Secur. Commun. Netw. 2018, 2018, 5978636. [Google Scholar] [CrossRef]
- Alsmadi, I.M.; Karabatis, G.; Aleroud, A. Information Fusion for Cyber-Security Analytics; Springer: Basel, Switzerland, 2017. [Google Scholar]
- Aleroud, A.; Karabatis, G. Contextual information fusion for intrusion detection: A survey and taxonomy. Knowl. Inf. Syst. 2017, 52, 563–619. [Google Scholar] [CrossRef]
- AlEroud, A.; Karabatis, G. Beyond data: Contextual information fusion for cyber security analytics. In Proceedings of the 31st ACM Symposium on Applied Computing, Pisa, Italy, 4–8 April 2016. [Google Scholar]
- Rajeev, S.; Sivanandam, S.N.; Pradeep, P. Architecture for Authentication in Wireless Differentiated Services Using Distributed Substring Authentication Protocol (DSAP); Assumption University: Bangkok, Thailand, 2015. [Google Scholar]
- Black, D.; Jones, P. Differentiated Services (DiffServ) and Real-time Communication. 2015. Available online: https://buildbot.tools.ietf.org/html/rfc7657 (accessed on 22 November 2018).
- Mahale, V.; Pareek, P.; Uttarwar, U. Alleviation of DDoS attack using advance technique. In Proceedings of the International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bangalore, India, 21–23 February 2017; IEEE: Piscataway, NJ, USA, 2017; Volume 1, pp. 172–176. [Google Scholar]
- Apiecionek, L.; Czerniak, M.; Dobrosielski, T. Quality of services method as a DDoS protection tool. In Proceedings of the Intelligent Systems’2014, Proceedings of the 7th IEEE International Conference Intelligent Systems IS’2014, Warsaw, Poland, 24–26 September 2014; Springer: Berlin/Heidelberg, Germany, 2015. [Google Scholar]
- Kambourakis, G.; Moschos, T.; Geneiatakis, D.; Gritzalis, S. A fair solution to DNS amplification attacks. In Proceedings of the Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007), Samos, Greece, 27–28 August 2007. [Google Scholar]
- Anagnostopoulos, M.; Kambourakis, G.; Kopanos, P.; Louloudakis, G.; Gritzalis, S. DNS amplification attack revisited. Comput. Secur. 2013, 39, 475–485. [Google Scholar] [CrossRef]
- Kramer, L.; Krupp, J.; Makita, D. Amppot: Monitoring and defending against amplification ddos attacks. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection, Kyoto, Japan, 2–4 November 2015; Volume 1, pp. 615–636. [Google Scholar]
- Jing, L.; Licheng, W.; Lihua, W. Verifiable Chebyshev Maps-Based Chaotic Encryption Schemes with Outsourcing Computations in the Cloud/Fog Scenarios. Concurrency and Computation: Practice and Experience; Wiley Online Library: Hoboken, NJ, USA, 2018. [Google Scholar] [CrossRef]
- Li, J.; Chen, X.; Chow, S.S.; Huang, Q.; Wong, D.S.; Liu, Z. Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 2018, 112, 89–96. [Google Scholar] [CrossRef]
- Gao, C.Z.; Cheng, Q.; He, P.; Susilo, W.; Li, J. Privacy-Preserving Naive Bayes Classifiers Secure against the Substitution-then-Comparison Attack. Inf. Sci. 2018, 444, 72–88. [Google Scholar] [CrossRef]
- Li, J.; Liu, Z.; Chen, X.; Xhafa, F.; Tan, X.; Wong, D.S. L-EncDB: A Lightweight Framework for Privacy-Preserving Data Queries in Cloud Computing. Knowl.-Based Syst. 2015, 79, 18–26. [Google Scholar] [CrossRef]
- Li, T.; Li, J.; Liu, Z.; Li, P.; Jia, C. Differentially Private Naive Bayes Learning over Multiple Data Sources. Inf. Sci. 2018, 444, 89–104. [Google Scholar] [CrossRef]
- Liu, Z.; Wu, Z.; Li, T.; Li, J.; Shen, C. GMM and CNN Hybrid Method for Short Utterance Speaker Recognition. IEEE Trans. Ind. Inform. 2018, 14, 3224–3252. [Google Scholar] [CrossRef]
- Li, J.; Sun, L.; Yan, Q.; Li, Z.; Srisa-an, W.; Ye, H. Significant permission identification for machine learning based android malware detection. IEEE Trans. Ind. Inform. 2018, 14, 3216–3225. [Google Scholar] [CrossRef]
- Li, Y.; Wang, G.; Nie, L.; Wang, Q.; Tan, W. Distance Metric Optimization Driven Convolutional Neural Network for Age Invariant Face Recognition. Pattern Recognit. 2018, 75, 51–62. [Google Scholar] [CrossRef]
- Shen, J.; Gui, Z.; Ji, S.; Shen, J.; Tan, H.; Tang, Y. Cloud-aided Lightweight Certificateless Authentication Protocol with Anonymity for Wireless Body Area Networks. J. Netw. Comput. Appl. 2018, 106, 117–123. [Google Scholar] [CrossRef]
- Rossow, C. Amplification Hell: Revisiting Network Protocols for DDoS Abuse; NDSS: New York, NY, USA, 2014. [Google Scholar]
- Ryba, F.J.; Orlinski, M.; Wählisch, M.; Rossow, C.; Schmidt, T.C. Amplification and DRDoS Attack Defense—A Survey and New Perspectives. arXiv, 2015; arXiv:1505.07892. [Google Scholar]
- Czyz, J.; Kallitsis, M.; Gharaibeh, M. Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks. In Proceedings of the Conference on Internet Measurement, Vancouver, BC, Canada, 5–7 November 2014; ACM: New York, NY, USA, 2014; Volume 1, pp. 435–448. [Google Scholar]
- Karami, M.; McCoy, D. Understanding the Emerging Threat of DDoS-as-a-Service. In Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET’13), Washington, DC, USA, 12 August 2013. [Google Scholar]
- Durumeric, Z.; Bailey, M.; Halderman, A. An Internet-Wide View of Internet-Wide Scanning. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, 20–22 August 2014; Volume 1, pp. 65–78. [Google Scholar]
- Jeff Yan, J.; Choi, H.J. Security issues in online games. Electron. Libr. 2002, 20, 125–133. [Google Scholar] [CrossRef]
- Paulson, A.; Weber, E. Cyberextortion: An overview of distributed denial of service attacks against online gaming companies. Issues Inf. Syst. 2006, 7, 52–56. [Google Scholar]
- Bingshuang, L.; Jun, L.; Tao, W. SF-DRDoS: The store-and-flood distributed reflective denial of service attack. Comput. Commun. 2015, 69, 107–115. [Google Scholar]
- Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and other botnets. Computer 2017, 50, 80–84. [Google Scholar] [CrossRef]
- WRCCDC 2018. Available online: https://archive.wrccdc.org/pcaps/2018/ (accessed on 11 June 2018).
Method | Detection Rate/Missing Rate/False Alarm Rate | |||
---|---|---|---|---|
HDTI | 100.0/0.0/0.0 | 99.2/0.8/0.0 | 97.3/2.7/0.0 | 99.5/0.5/0.0 |
SVM | 94.4/5.6/10.4 | 92.3/7.6/12.6 | 93.7/6.3/15.6 | 94.3/5.6/10.3 |
Random Forest | 100.0/0.0/9.2 | 100.0/0.0/3.2 | 23.1/76.9/2.4 | 27.3/72.7/0.4 |
kNN | 99.9/0.1/10.5 | 100.0/0.1/2.7 | 75.0/25.0/3.0 | 100.0/0.1/0.5 |
Method | Detection Rate/Missing Rate/False Alarm Rate | |||
---|---|---|---|---|
HDTI | 100.0/0.0/0.0 | 100.0/0.0/0.0 | 99.8/0.2/0.0 | 100.0/0.0/0.0 |
SVM | 93.4/6.5/10.4 | 86.9/13.1/19.4 | 88.4/11.6/23.1 | 91.4/9.5/17.1 |
Random Forest | 100.0/0.0/12.0 | 100.0/0.0/0.8 | 100.0/0.0/3.0 | 100.0/0.0/0.7 |
kNN | 100.0/0.0/15.0 | 100.0/0.0/1.2 | 100.0/0.0/0.6 | 100.0/0.0/0.3 |
Method | Detection Rate/Missing Rate/False Alarm Rate | |||
---|---|---|---|---|
HDTI | 100.0/0.0/0.0 | 99.4/0.5/0.0 | 98.8/0.1/0.0 | 100.0/0.0/0.0 |
SVM | 93.8/6.1/15.2 | 91.2/8.8/14.7 | 89.1/10.8/10.2 | 90.5/9.5/7.2 |
Random Forest | 100.0/0.0/13.2 | 75.0/25.0/0.2 | 100.0/0.0/1.7 | 100.0/0.0/0.2 |
kNN | 100.0/0.0/15.3 | 100.0/0.0/0.5 | 100.0/0.0/2.0 | 100.0/0.0/0.1 |
Method | Detection Rate/Missing Rate/False Alarm Rate | |||
---|---|---|---|---|
HDTI | 100.0/0.0/0.0 | 100.0/0.0/0.0 | 99.3/0.7/0.0 | 99.8/0.2/0.0 |
SVM | 91.2/8.7/20.3 | 93.7/6.2/12.7 | 93.0/7.0/17.9 | 92.6/7.4/16.4 |
Random Forest | 100.0/0.0/9.1 | 100.0/0.0/0.0 | 100.0/0.0/0.5 | 100.0/0.0/0.3 |
kNN | 100.0/0.0/13.0 | 100.0/0.0/0.0 | 100.0/0.0/0.7 | 100.0/0.0/0.4 |
Method | Detection Rate/Missing Rate/False Alarm Rate | |||
---|---|---|---|---|
HDTI | 100.0/0.0/0.0 | 100.0/0.0/0.1 | 99.4/0.6/0.0 | 100.0/0.0/0.0 |
SVM | 90.5/9.5/18.2 | 92.5/7.5/14.2 | 88.1/11.9/10.7 | 89.4/10.6/9.7 |
Random Forest | 100.0/0.0/1.8 | 23.5/76.4/0.0 | 100.0/0.0/1.1 | 100.0/0.0/0.1 |
kNN | 100.0/0.0/1.6 | 100.0/0.0/0.2 | 100.0/0.0/0.6 | 100.0/0.0/0.3 |
Method | Detection Rate/Missing Rate/False Alarm Rate | |||
---|---|---|---|---|
HDTI | 100.0/0.0/0.0 | 100.0/0.0/0.0 | 100.0/0.0/0.0 | 100.0/0.0/0.0 |
SVM | 95.9/4.1/3.1 | 94.1/3.9/1.5 | 92.5/7.5/4.2 | 93.1/6.9/5.1 |
Random Forest | 100.0/0.0/0.0 | 14.3/85.7/0.0 | 100.0/0.0/0.0 | 100.0/0.0/0.0 |
kNN | 100.0/0.0/1.8 | 100.0/0.0/0.8 | 100.0/0.0/0.1 | 100.0/0.0/0.0 |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Xu, R.; Cheng, J.; Wang, F.; Tang, X.; Xu, J. A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment. Symmetry 2019, 11, 78. https://doi.org/10.3390/sym11010078
Xu R, Cheng J, Wang F, Tang X, Xu J. A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment. Symmetry. 2019; 11(1):78. https://doi.org/10.3390/sym11010078
Chicago/Turabian StyleXu, Ruomeng, Jieren Cheng, Fengkai Wang, Xiangyan Tang, and Jinying Xu. 2019. "A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment" Symmetry 11, no. 1: 78. https://doi.org/10.3390/sym11010078
APA StyleXu, R., Cheng, J., Wang, F., Tang, X., & Xu, J. (2019). A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment. Symmetry, 11(1), 78. https://doi.org/10.3390/sym11010078