DDoS Attack Detection Method Based on V-Support Vector Machine

The characteristics of distributed denial of service (DDoS) attack diversity, distribution and burstiness in the new network environment make it difficult to detect the current detection methods. This paper proposes a DDoS attack detection method based on V-Support Vector Machine (SVM). This method defines a nine-tuple network service association feature to extract the feature of the network flow, then normalizes the feature data and reduces the dimension by principal component analysis. Finally, select the appropriate kernel function and introduce the parameter V control support vector and the number of error vectors, establish a V-SVM-based DDoS attack classification model to detect attacks. The experimental results show that compared with similar methods, this method not only improves the accuracy, reduces the false negative rate, but also ensures the stability and timeliness of the classification model.

[1]  Kejun Zhao,et al.  A new C-RAN architecture based on RF signal soft-switching , 2016, Ann. des Télécommunications.

[2]  Doo-Soon Park,et al.  Network anomaly detection based on probabilistic analysis , 2018, Soft Comput..

[3]  Jin Li,et al.  Outsourcing computation of modular exponentiations in cloud computing , 2013, Cluster Computing.

[4]  Daizhan Cheng,et al.  On controllability and stabilizability of probabilistic Boolean control networks , 2012, Science China Information Sciences.

[5]  Mohiuddin Ahmed,et al.  Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection , 2015, Annals of Data Science.

[6]  Jin Li,et al.  Digital provenance: Enabling secure data forensics in cloud computing , 2014, Future Gener. Comput. Syst..

[7]  Bayu Adhi Tama,et al.  Data Mining Techniques in DoS/DDoS Attack Detection: A Literature Review , 2015 .

[8]  Tanja Zseby,et al.  Analysis of network traffic features for anomaly detection , 2014, Machine Learning.

[9]  Vincent Lenders,et al.  Gaining an Edge in Cyberspace with Advanced Situational Awareness , 2015, IEEE Security & Privacy.

[10]  Pei-Yi Hao,et al.  New support vector algorithms with parametric insensitive/margin model , 2010, Neural Networks.

[11]  Ying-feng Zhang,et al.  Study on Fault Classification of Power-Shift Steering Transmission Based on v-Support Vector Machine , 2013 .

[12]  Haider Abbas,et al.  Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems , 2016, Ann. des Télécommunications.

[13]  Jianping Yin,et al.  A change-point DDoS attack detection method based on half interaction anomaly degree , 2017, Int. J. Auton. Adapt. Commun. Syst..

[14]  Mohammad Khubeb Siddiqui,et al.  Analysis of KDD CUP 99 Dataset using Clustering based Data Mining , 2013 .

[15]  Liu Yan-heng,et al.  Dynamic entropy based DoS attack detection method , 2013 .

[16]  Bernhard Schölkopf,et al.  New Support Vector Algorithms , 2000, Neural Computation.

[17]  Cleonilson Protásio de Souza,et al.  A comparative study of use of Shannon, Rényi and Tsallis entropy for attribute selecting in network intrusion detection , 2011, M&N.

[18]  Qiang Liu,et al.  A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence , 2018, Comput. J..

[19]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[20]  Munesh Chandra Trivedi,et al.  DDA: An Approach to Handle DDoS (Ping Flood) Attack , 2016 .

[21]  P. Kavitha,et al.  Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier , 2016, Wirel. Networks.

[22]  V. Sheng,et al.  An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment , 2018 .

[23]  Salvatore J. Stolfo,et al.  Mining in a data-flow environment: experience in network intrusion detection , 1999, KDD '99.

[24]  Sunny Behal,et al.  Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review , 2017, Int. J. Netw. Secur..

[25]  Paul C. Gilmore The lambda-gamma calculus: A language adequate for defining recursive functions , 1970, Inf. Sci..

[26]  Witawas Srisa-an,et al.  Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.

[27]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.

[28]  Zhen Zhang,et al.  Uncovering network traffic anomalies based on their sparse distributions , 2014, Science China Information Sciences.

[29]  G. Aghila,et al.  A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[30]  Jin Li,et al.  Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack , 2018, Inf. Sci..