TSD3: A Novel Time-Series-Based Solution for DDoS Attack Detection

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Distributed Denial-of-Service (DDoS) attack has long been one of the biggest threats to network security. Most existing approaches collect and analyze the network traffic in a fixed window (e.g., 1 min or 5 min) to detect ongoing attacks. However, they cannot track temporal information, such as the arriving moments of packets and the persistence of malicious flows in the time dimension, which inevitably harms their effectiveness. To this end, this work proposes a novel solution called Time-Series DDoS Detection (TSD3). First, we design an attention-based traffic sampling algorithm to support short-period (e.g., 1 s) traffic monitoring. The proposed sampling solution can continuously track network flows with limited storage and communication resources and naturally attach the flow records with fine-grained time information, i.e., slice index. Then we perform time-series analysis by encoding the flow records of successive periods to persistence distributions and training a classifier to identify the attacking or normal flows. The experimental results based on real-world network traces show that our approach significantly outperforms the state-of-the-art methods in terms of Accuracy, Recall, and F1-score.

Cite

CITATION STYLE

APA

Han, Y., Du, Y., Chen, S., Huang, H., & Sun, Y. E. (2023). TSD3: A Novel Time-Series-Based Solution for DDoS Attack Detection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 13423 LNCS, pp. 318–333). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-25201-3_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free