期刊论文详细信息
Symmetry
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment
Fengkai Wang1  Ruomeng Xu2  Jieren Cheng2  Xiangyan Tang2  Jinying Xu3 
[1] Rossier School, University of Southern California, California, CA 90089, USA;School of Information Science and Technology, Hainan University, Haikou 570228, China;Zhejiang Science and Technology Information Institute, Hangzhou 310006, China;
关键词: DRDoS;    deep forest;    IoT;    big data;    differentiated service;   
DOI  :  10.3390/sym11010078
来源: DOAJ
【 摘 要 】

Distributed Denial of Service (DDoS) has developed multiple variants, one of which is Distributed Reflective Denial of Service (DRDoS). With the increasing number of Internet of Things (IoT) devices, the threat of DRDoS attack is growing, and the damage of a DRDoS attack is more destructive than other types. The existing DDoS detection methods cannot be generalized in DRDoS early detection, which leads to heavy load or degradation of service when deployed at the final point. In this paper, we propose a DRDoS detection and defense method based on deep forest model (DDDF), and then we integrate differentiated service into defense model to filter out DRDoS attack flow. Firstly, from the statistics perspective on different stages of DRDoS attack flow in the big data environment, we extract a host-based DRDoS threat index (HDTI) from the network flows. Secondly, using the HDTI feature we build a DRDoS detection and defense model based on the deep forest, which consists of 1 extreme gradient boost (XGBoost) forest estimator, 2 random forest estimators, and 2 extra random forest estimators in each layer. Lastly, the differentiated service procedure applies the detection result from DDDF to drop the traffic identified in different stages and different detection points. Theoretical analysis and experiments show that the method we proposed can effectively identify DRDoS attack with higher detection rate and a lower false alarm rate, the defense model also shows distinguishing ability to effectively eliminate the DRDoS attack flows, and dramatically mitigate the damage of a DRDoS attack.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:3次