2019
DOI: 10.3390/sym11010078
|View full text |Cite
|
Sign up to set email alerts
|

A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment

Abstract: Distributed Denial of Service (DDoS) has developed multiple variants, one of which is Distributed Reflective Denial of Service (DRDoS). With the increasing number of Internet of Things (IoT) devices, the threat of DRDoS attack is growing, and the damage of a DRDoS attack is more destructive than other types. The existing DDoS detection methods cannot be generalized in DRDoS early detection, which leads to heavy load or degradation of service when deployed at the final point. In this paper, we propose a DRDoS d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 40 publications
0
5
0
Order By: Relevance
“…The tree is inspected from top to bottom, where a given condition is checked at each node by analyzing the features of the input sample, leading to the following node [1,3,27,28]. • Random Forest: they are ensemble methods consisting of several Decision Trees, in which the output is computed after evaluating the prediction of each individual tree composing the "forest" [1,3,[27][28][29].…”
Section: Machine Learning For Cyber Detectionmentioning
confidence: 99%
“…The tree is inspected from top to bottom, where a given condition is checked at each node by analyzing the features of the input sample, leading to the following node [1,3,27,28]. • Random Forest: they are ensemble methods consisting of several Decision Trees, in which the output is computed after evaluating the prediction of each individual tree composing the "forest" [1,3,[27][28][29].…”
Section: Machine Learning For Cyber Detectionmentioning
confidence: 99%
“…In case of an attack, the DDoS filtering rule base module is notified, which detects attack packet features and filters out packets arriving from malicious clients, thus blocking a DDoS attack. Xu et al (2019) proposed a detection method for DRDoS using Deep Forest model in a Big Data environment. The model utilizes statistical information of DRDoS attack flow.…”
Section: Low Computation Complexitymentioning
confidence: 99%
“…The high volumes of structured, semi-structured and unstructured data generated at an express rate renders conventional methods to powerless in terms of management and analysis. Therefore, big data analytics is becoming increasingly appealing in recent times owing to its capacity to perform a detailed analysis on a variety of data (Cheng et al, 2018;Lan & Jun, 2013;Mahmood & Afzal, 2013;Raj, 2014;Singh et al, 2014;Xu et al, 2019). Still unexplored, big data analytics could prove as a silver bullet against mitigating botnet-based DDoS attacks in various environment.…”
Section: Open Challenges and Future Research Directionsmentioning
confidence: 99%
“…Karim et al [8] study about experimental performance of Snort-based IDS (S-IDS) in network. Xu et al [9] suggest Distributed Denial-of-Service (DRDoS) detection and defense model based on Deep Forest model (DDDF). In particular, they focus on attacks in Internet of Things (IoT) devices and big data environment.…”
Section: Trends Of Ids Studiesmentioning
confidence: 99%