Skip to main content

DDoS Detection Based on Second-Order Features and Machine Learning

  • Conference paper
  • First Online:
Trustworthy Computing and Services (ISCTCS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 520))

Included in the following conference series:

  • 994 Accesses

Abstract

In recent years, there appeared several new forms of DDoS attacks, such as DDoS using botnet, DNS Amplification attack and NTP Amplification attack, posing a great threat to network security and seriously affecting the stability and reliability of the network. Therefore, detecting the DDoS attacks accurately and timely has positive significance to mitigate DDoS attacks as soon as possible and reduce the impact of DDoS attacks. Previously, most of the researchers focused on extracting features of traffic and finding effective approaches to detect DDoS attack, while ignoring the correlativity between features. This paper applies second-order features to machine learning algorithms in order to study the correlativity between features and use sliding window mechanism to improve the model. We use KDD CUP 99 dataset for evaluating the methods. The evaluation results show that the correlativity between features can accurately differentiate DDoS attacks from normal traffic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yeung, D.S., Jin, S.: Covariance matrix modeling and detecting various flooding attacks. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 13, 222–232 (2007)

    Google Scholar 

  2. Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 222–232 (1987)

    Article  Google Scholar 

  3. García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009). ISSN: 0167-4048

    Article  Google Scholar 

  4. Tan, X., Xi, H.: Hidden semi-markov model for anomaly detection. Appl. Math. Comput. 205(2), 562–567 (2008). ISSN: 0096-3003

    Article  MATH  MathSciNet  Google Scholar 

  5. Vijayasarathy, R., Raghavan, S.V., Ravindran, B.: A system approach to network modeling for DDoS detection using a Naïve Bayesian classifier. In: 2011 Third International Conference on Communication Systems and Networks (COMSNETS), pp. 1–10, 4–8 January 2011

    Google Scholar 

  6. Reif, M., Goldstein, M., Stahl, A., Breuel, T.M.: Anomaly detection by combining decision trees and parametric densities. In: 2008 19th International Conference on Pattern Recognition, ICPR 2008, pp. 1–4, 8–11 December 2008

    Google Scholar 

  7. Ndong, J., Salamatian, K.: A robust anomaly detection technique using combined statistical methods. In: Proceedings of the 2011 Ninth Annual Communication Networks and Services Research Conference (CNSR 2011). IEEE Computer Society, Washington, pp. 101–108

    Google Scholar 

  8. Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. 24(4), 295–307 (2005)

    Article  Google Scholar 

Download references

Acknowledgement

This work is supported by the Natural Science Foundation of China (Grant No. 61202058).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaowei He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

He, X., Jin, S., Yang, Y., Chi, H. (2015). DDoS Detection Based on Second-Order Features and Machine Learning. In: Yueming, L., Xu, W., Xi, Z. (eds) Trustworthy Computing and Services. ISCTCS 2014. Communications in Computer and Information Science, vol 520. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47401-3_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47401-3_26

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47400-6

  • Online ISBN: 978-3-662-47401-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics