4.7 Article

On the performance of intelligent techniques for intensive and stealthy DDos detection

Journal

COMPUTER NETWORKS
Volume 164, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.comnet.2019.106906

Keywords

DDoS detection review; Machine learning; Empirical analysis

Ask authors/readers for more resources

Distributed Denial of Services (DDoS) attacks continue to be one of the most challenging threats to the Internet. The intensity and frequency of these attacks are increasing at an alarming rate. With the promising results presented by Machine Learning (ML) techniques in variety fields, researchers have proposed numerous intelligent schemes to defend against DDoS attacks and mitigate their impact. This paper presents a taxonomy of the ML-based DDoS detection schemes, focusing on the important features and mechanisms that each scheme uses to detect and mitigate the impact of these attacks. The taxonomy is developed based on a thorough and extensive review of the literature, focusing on the most prominent and highly cited schemes that have been proposed over the last decade. The taxonomy is then used as a basis for the development of a framework to conduct a comprehensive empirical evaluation of the basic mechanisms underling the design of the selected ML-based DDoS defense schemes against a variety of attack scenarios. Rather than dealing with the specific details of a particular DDoS defense scheme, this work focuses on the building blocks of the intelligent DDoS detection and prevention schemes. The intelligent mechanisms underlying the selected schemes are implemented and evaluated using different performance metrics. The impact of different influential factors are also explored, including the observable traffic proportions, attack intensities and the Class Imbalance Problem of ML-based DDoS detection. The results of the comparative analysis show that no single technique outperforms all others in all test cases. Furthermore, the results underscore the need for a method oriented feature selection model to enhance the capabilities of ML-based detection techniques. Finally, the results show that the class imbalance problem significantly impact performance, underscoring the need for further research to address this problem and ensure high-quality DDoS detection in real-time. (C) 2019 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
Article Computer Science, Hardware & Architecture

TEA-RFFI: Temperature adjusted radio frequency fingerprint-based smartphone identification

Xiaolin Gu, Wenjia Wu, Yusen Zhou, Aibo Song, Ming Yang, Zhen Ling, Junzhou Luo

Summary: This study proposes a radio frequency fingerprint identification solution based on crystal oscillator temperature adjustment, which enhances the differences between Wi-Fi device fingerprints and mitigates collision. Experimental results demonstrate the effectiveness of the system in identifying smartphones under different scenarios.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

QoS-based resource allocation for uplink NOMA networks

Yutong Wu, Jianyue Zhu, Xiao Chen, Yu Zhang, Yao Shi, Yaqin Xie

Summary: This paper proposes a quality-of-service-based SIC order method and optimizes power allocation for maximizing the rate in the uplink NOMA system. The simulation results demonstrate the superiority of the proposed method compared to traditional orthogonal multiple access and exhaustive search.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

Mitigating the impact of controller failures on QoS robustness for software-defined wide area networks

Songshi Dou, Li Qi, Zehua Guo

Summary: Emerging cloud services and applications have different QoS requirements for the network. SD-WANs play a crucial role in QoS provisioning by introducing network programmability, dynamic flow routing, and low data transmission latency. However, controller failures may degrade QoS. To address this, we propose PREDATOR, a QoS-aware network programmability recovery scheme that achieves fine-grained per-flow remapping without introducing extra delays, ensuring QoS robustness for high-priority flows.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

An efficient topology partitioning algorithm for system-level parallel simulation of mega satellite constellation communication networks

Ke Wang, Xiaojuan Ma, Heng Kang, Zheng Lyu, Baorui Feng, Wenliang Lin, Zhongliang Deng, Yun Zou

Summary: This paper proposes a method based on a parallel network simulation architecture to improve the simulation efficiency of satellite networks. By effectively partitioning the network topology and using algorithms such as resource assessment and load balancing, the simulation performance is enhanced. Experimental results demonstrate the effectiveness of this method.

COMPUTER NETWORKS (2024)

Article Computer Science, Hardware & Architecture

Reuse-based online joint routing and scheduling optimization mechanism in deterministic networks

Sijin Yang, Lei Zhuang, Julong Lan, Jianhui Zhang, Bingkui Li

Summary: This paper proposes a reuse-based online scheduling mechanism that achieves deterministic transmission of dynamic flows through dynamic path planning and coordinated scheduling of time slots. Experimental results show that the proposed mechanism improves the scheduling success rate by 37.3% and reduces time costs by up to 66.6% compared to existing online scheduling algorithms.

COMPUTER NETWORKS (2024)