ML-Based DDoS Detection and Identification Using Native Cloud Telemetry Macroscopic Monitoring
Autor: | Rodolfo da Silva Villaça, Moisés R. N. Ribeiro, Patrick Marques Ciarelli, João Henrique G. M. Corrêa |
---|---|
Rok vydání: | 2021 |
Předmět: |
Ping (video games)
Computer Networks and Communications business.industry Network packet Computer science Strategy and Management ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS Testbed Real-time computing 020206 networking & telecommunications Cloud computing Denial-of-service attack 02 engineering and technology Random forest Identification (information) Hardware and Architecture 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing Enhanced Data Rates for GSM Evolution business Information Systems |
Zdroj: | Journal of Network and Systems Management. 29 |
ISSN: | 1573-7705 1064-7570 |
DOI: | 10.1007/s10922-020-09578-1 |
Popis: | The detection and identification of Distributed Denial-of-Service (DDoS) attacks remains a challenge in cloud/edge/fog computing environments. It usually requires network middleboxes, such as deep packet inspectors (DPI), for detection task mostly. But clouds and fogs have native powerful telemetry systems that are not yet fully exploited for DDoS detection; and provide so much information that could aid attack identification tasks as well. Machine Learning (ML) algorithms can help one diving into the richness of cloud’s native data collection services, which have a multitude of metrics from both physical and virtual hosts. This paper evaluates the use of ML algorithms over datasets collected from a experimental testbed based on OpenStack. Controlled attack scenarios were used to investigate the ability of ML for tasks such as detecting and identifying SYN_Flood and GET_Flood DDoS attacks mixed, in different proportions, with legitimate clients. kNN and Random Forest ML algorithms were trained and tested, and for evaluation the metrics accuracy, recall, precision, and F1-score were used. Our experiments presented about 87% of accuracy in the detection of SYN_Flood and GET_Flood DDoS attacks, whereas Snort IDS mostly fails to detect the latter attack by processing the corresponding packet traces. Also, the detection of PING_Flood DDoS attack was tested without training as an initial evaluation towards the generalization of the proposal. |
Databáze: | OpenAIRE |
Externí odkaz: |