2022
DOI: 10.1109/access.2022.3169616
|View full text |Cite
|
Sign up to set email alerts
|

LSTM-Based Collaborative Source-Side DDoS Attack Detection

Abstract: As denial of service attacks become more sophisticated, the source-side detection techniques are being studied to solve the limitations of target-side detection techniques such as delayed detection and difficulty in tracking attackers. Recently, some source-side detection techniques are being studied to use an adaptive attack detection threshold considering seasonal behavior of network traffic. However, because patterns of network traffic usage have become irregular with increased randomness and explosive traf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…Accidental traffic-driven source-side networks benefit from LSTM-based adaptive thresholds. Combining network traffic data for source-side attack detection reduces false positives by 15% while maintaining high detection rates [2]. This study presents a cloud computing DDoS detection and mitigation approach.…”
Section: Literature Surveymentioning
confidence: 99%
“…Accidental traffic-driven source-side networks benefit from LSTM-based adaptive thresholds. Combining network traffic data for source-side attack detection reduces false positives by 15% while maintaining high detection rates [2]. This study presents a cloud computing DDoS detection and mitigation approach.…”
Section: Literature Surveymentioning
confidence: 99%
“…However, it lacks consideration of temporal information during model training and is assessed only with two benchmark datasets. Yeom et al [19] propose a collaborative source-side DDoS attack detection framework based on LSTM. This approach involves sharing attack detection results amongst source-side networks of multiple regions, making this method expensive and difficult to collaborate with different real-world entities.…”
Section: Related Workmentioning
confidence: 99%