On the Detection of Low-Rate Denial of Service Attacks at Transport and Application Layers

Date

2021-08-30

Authors

Vedula, Vasudha
Lama, Palden
Boppana, Rajendra V.
Trejo, Luis A.

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

Distributed denial of service (DDoS) attacks aim to deplete the network bandwidth and computing resources of targeted victims. Low-rate DDoS attacks exploit protocol features such as the transmission control protocol (TCP) three-way handshake mechanism for connection establishment and the TCP congestion-control induced backoffs to attack at a much lower rate and still effectively bring down the targeted network and computer systems. Most of the statistical and machine/deep learning-based detection methods proposed in the literature require keeping track of packets by flows and have high processing overheads for feature extraction. This paper presents a novel two-stage model that uses Long Short-Term Memory (LSTM) and Random Forest (RF) to detect the presence of attack flows in a group of flows. This model has a very low data processing overhead; it uses only two features and does not require keeping track of packets by flows, making it suitable for continuous monitoring of network traffic and on-the-fly detection. The paper also presents an LSTM Autoencoder to detect individual attack flows with high detection accuracy using only two features. Additionally, the paper presents an analysis of a support vector machine (SVM) model that detects attack flows in slices of network traffic collected for short durations. The low-rate attack dataset used in this study is made available to the research community through GitHub.

Description

Keywords

deep learning models, distributed denial of service attacks, HTTP slow-read attacks, machine learning models, network security, TCP SYN floods

Citation

Electronics 10 (17): 2105 (2021)

Department

Computer Science