Cargando…
Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain
The continuous advancement of DDoS attack technology and an increasing number of IoT devices connected on 5G networks escalate the level of difficulty for DDoS mitigation. A growing number of researchers have started to utilise Deep Learning algorithms to improve the performance of DDoS mitigation s...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer Berlin Heidelberg
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7994918/ https://www.ncbi.nlm.nih.gov/pubmed/33786073 http://dx.doi.org/10.1007/s13042-021-01306-8 |
_version_ | 1783669858523676672 |
---|---|
author | Ko, Ili Chambers, Desmond Barrett, Enda |
author_facet | Ko, Ili Chambers, Desmond Barrett, Enda |
author_sort | Ko, Ili |
collection | PubMed |
description | The continuous advancement of DDoS attack technology and an increasing number of IoT devices connected on 5G networks escalate the level of difficulty for DDoS mitigation. A growing number of researchers have started to utilise Deep Learning algorithms to improve the performance of DDoS mitigation systems. Real DDoS attack data has no labels, and hence, we present an intelligent attack mitigation (IAM) system, which takes an ensemble approach by employing Recurrent Autonomous Autoencoders (RAA) as basic learners with a majority voting scheme. The RAA is a target-driven, distributionenabled, and imbalanced clustering algorithm, which is designed to work with the ISP’s blackholing mechanism for DDoS flood attack mitigation. It can dynamically select features, decide a reference target (RT), and determine an optimal threshold to classify network traffic. A novel Comparison-Max Random Walk algorithm is used to determine the RT, which is used as an instrument to direct the model to classify the data so that the predicted positives are close or equal to the RT. We also propose Estimated Evaluation Metrics (EEM) to evaluate the performance of unsupervised models. The IAM system is tested with UDP flood, TCP flood, ICMP flood, multi-vector and a real UDP flood attack data. Additionally, to check the scalability of the IAM system, we tested it on every subdivided data set for distributed computing. The average Recall on all data sets was above 98%. |
format | Online Article Text |
id | pubmed-7994918 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Springer Berlin Heidelberg |
record_format | MEDLINE/PubMed |
spelling | pubmed-79949182021-03-26 Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain Ko, Ili Chambers, Desmond Barrett, Enda Int J Mach Learn Cybern Original Article The continuous advancement of DDoS attack technology and an increasing number of IoT devices connected on 5G networks escalate the level of difficulty for DDoS mitigation. A growing number of researchers have started to utilise Deep Learning algorithms to improve the performance of DDoS mitigation systems. Real DDoS attack data has no labels, and hence, we present an intelligent attack mitigation (IAM) system, which takes an ensemble approach by employing Recurrent Autonomous Autoencoders (RAA) as basic learners with a majority voting scheme. The RAA is a target-driven, distributionenabled, and imbalanced clustering algorithm, which is designed to work with the ISP’s blackholing mechanism for DDoS flood attack mitigation. It can dynamically select features, decide a reference target (RT), and determine an optimal threshold to classify network traffic. A novel Comparison-Max Random Walk algorithm is used to determine the RT, which is used as an instrument to direct the model to classify the data so that the predicted positives are close or equal to the RT. We also propose Estimated Evaluation Metrics (EEM) to evaluate the performance of unsupervised models. The IAM system is tested with UDP flood, TCP flood, ICMP flood, multi-vector and a real UDP flood attack data. Additionally, to check the scalability of the IAM system, we tested it on every subdivided data set for distributed computing. The average Recall on all data sets was above 98%. Springer Berlin Heidelberg 2021-03-26 2021 /pmc/articles/PMC7994918/ /pubmed/33786073 http://dx.doi.org/10.1007/s13042-021-01306-8 Text en © The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Original Article Ko, Ili Chambers, Desmond Barrett, Enda Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain |
title | Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain |
title_full | Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain |
title_fullStr | Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain |
title_full_unstemmed | Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain |
title_short | Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain |
title_sort | recurrent autonomous autoencoder for intelligent ddos attack mitigation within the isp domain |
topic | Original Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7994918/ https://www.ncbi.nlm.nih.gov/pubmed/33786073 http://dx.doi.org/10.1007/s13042-021-01306-8 |
work_keys_str_mv | AT koili recurrentautonomousautoencoderforintelligentddosattackmitigationwithintheispdomain AT chambersdesmond recurrentautonomousautoencoderforintelligentddosattackmitigationwithintheispdomain AT barrettenda recurrentautonomousautoencoderforintelligentddosattackmitigationwithintheispdomain |