Cargando…

Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain

The continuous advancement of DDoS attack technology and an increasing number of IoT devices connected on 5G networks escalate the level of difficulty for DDoS mitigation. A growing number of researchers have started to utilise Deep Learning algorithms to improve the performance of DDoS mitigation s...

Descripción completa

Detalles Bibliográficos
Autores principales: Ko, Ili, Chambers, Desmond, Barrett, Enda
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Berlin Heidelberg 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7994918/
https://www.ncbi.nlm.nih.gov/pubmed/33786073
http://dx.doi.org/10.1007/s13042-021-01306-8
_version_ 1783669858523676672
author Ko, Ili
Chambers, Desmond
Barrett, Enda
author_facet Ko, Ili
Chambers, Desmond
Barrett, Enda
author_sort Ko, Ili
collection PubMed
description The continuous advancement of DDoS attack technology and an increasing number of IoT devices connected on 5G networks escalate the level of difficulty for DDoS mitigation. A growing number of researchers have started to utilise Deep Learning algorithms to improve the performance of DDoS mitigation systems. Real DDoS attack data has no labels, and hence, we present an intelligent attack mitigation (IAM) system, which takes an ensemble approach by employing Recurrent Autonomous Autoencoders (RAA) as basic learners with a majority voting scheme. The RAA is a target-driven, distributionenabled, and imbalanced clustering algorithm, which is designed to work with the ISP’s blackholing mechanism for DDoS flood attack mitigation. It can dynamically select features, decide a reference target (RT), and determine an optimal threshold to classify network traffic. A novel Comparison-Max Random Walk algorithm is used to determine the RT, which is used as an instrument to direct the model to classify the data so that the predicted positives are close or equal to the RT. We also propose Estimated Evaluation Metrics (EEM) to evaluate the performance of unsupervised models. The IAM system is tested with UDP flood, TCP flood, ICMP flood, multi-vector and a real UDP flood attack data. Additionally, to check the scalability of the IAM system, we tested it on every subdivided data set for distributed computing. The average Recall on all data sets was above 98%.
format Online
Article
Text
id pubmed-7994918
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Springer Berlin Heidelberg
record_format MEDLINE/PubMed
spelling pubmed-79949182021-03-26 Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain Ko, Ili Chambers, Desmond Barrett, Enda Int J Mach Learn Cybern Original Article The continuous advancement of DDoS attack technology and an increasing number of IoT devices connected on 5G networks escalate the level of difficulty for DDoS mitigation. A growing number of researchers have started to utilise Deep Learning algorithms to improve the performance of DDoS mitigation systems. Real DDoS attack data has no labels, and hence, we present an intelligent attack mitigation (IAM) system, which takes an ensemble approach by employing Recurrent Autonomous Autoencoders (RAA) as basic learners with a majority voting scheme. The RAA is a target-driven, distributionenabled, and imbalanced clustering algorithm, which is designed to work with the ISP’s blackholing mechanism for DDoS flood attack mitigation. It can dynamically select features, decide a reference target (RT), and determine an optimal threshold to classify network traffic. A novel Comparison-Max Random Walk algorithm is used to determine the RT, which is used as an instrument to direct the model to classify the data so that the predicted positives are close or equal to the RT. We also propose Estimated Evaluation Metrics (EEM) to evaluate the performance of unsupervised models. The IAM system is tested with UDP flood, TCP flood, ICMP flood, multi-vector and a real UDP flood attack data. Additionally, to check the scalability of the IAM system, we tested it on every subdivided data set for distributed computing. The average Recall on all data sets was above 98%. Springer Berlin Heidelberg 2021-03-26 2021 /pmc/articles/PMC7994918/ /pubmed/33786073 http://dx.doi.org/10.1007/s13042-021-01306-8 Text en © The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Original Article
Ko, Ili
Chambers, Desmond
Barrett, Enda
Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain
title Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain
title_full Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain
title_fullStr Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain
title_full_unstemmed Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain
title_short Recurrent autonomous autoencoder for intelligent DDoS attack mitigation within the ISP domain
title_sort recurrent autonomous autoencoder for intelligent ddos attack mitigation within the isp domain
topic Original Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7994918/
https://www.ncbi.nlm.nih.gov/pubmed/33786073
http://dx.doi.org/10.1007/s13042-021-01306-8
work_keys_str_mv AT koili recurrentautonomousautoencoderforintelligentddosattackmitigationwithintheispdomain
AT chambersdesmond recurrentautonomousautoencoderforintelligentddosattackmitigationwithintheispdomain
AT barrettenda recurrentautonomousautoencoderforintelligentddosattackmitigationwithintheispdomain