On the Detection of Low-Rate Denial of Service Attacks at Transport and Application Layers

Date
2021-08-30
Authors
Vedula, Vasudha
Lama, Palden
Boppana, Rajendra V.
Trejo, Luis A.
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract

Distributed denial of service (DDoS) attacks aim to deplete the network bandwidth and computing resources of targeted victims. Low-rate DDoS attacks exploit protocol features such as the transmission control protocol (TCP) three-way handshake mechanism for connection establishment and the TCP congestion-control induced backoffs to attack at a much lower rate and still effectively bring down the targeted network and computer systems. Most of the statistical and machine/deep learning-based detection methods proposed in the literature require keeping track of packets by flows and have high processing overheads for feature extraction. This paper presents a novel two-stage model that uses Long Short-Term Memory (LSTM) and Random Forest (RF) to detect the presence of attack flows in a group of flows. This model has a very low data processing overhead; it uses only two features and does not require keeping track of packets by flows, making it suitable for continuous monitoring of network traffic and on-the-fly detection. The paper also presents an LSTM Autoencoder to detect individual attack flows with high detection accuracy using only two features. Additionally, the paper presents an analysis of a support vector machine (SVM) model that detects attack flows in slices of network traffic collected for short durations. The low-rate attack dataset used in this study is made available to the research community through GitHub.

Description
Keywords
deep learning models, distributed denial of service attacks, HTTP slow-read attacks, machine learning models, network security, TCP SYN floods
Citation
Electronics 10 (17): 2105 (2021)
Department
Computer Science