2022
DOI: 10.3390/s22072532
|View full text |Cite
|
Sign up to set email alerts
|

Two-Stage Intelligent Model for Detecting Malicious DDoS Behavior

Abstract: 5G technologies provide ubiquitous connectivity. However, 5G security is a particularly important issue. Moreover, because public datasets are outdated, we need to create a self-generated dataset on the virtual platform. Therefore, we propose a two-stage intelligent detection model to enable 5G networks to withstand security issues and threats. Finally, we define malicious traffic detection capability metrics. We apply the self-generated dataset and metrics to thoroughly evaluate the proposed mechanism. We com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 37 publications
0
13
0
Order By: Relevance
“…We use tools and scripts to simulate attacks and normal flow [ 5 ], shown as Table 2 . For example, SlowHTTPTest is used to simulate slow headers, slow body, and slow headers belong to LDDoS attacks by setting the content length of the application layer to be large or the sending rate parameter to be lower than the expected rate, so as to continuously occupy HTTP connection sessions.…”
Section: Multi-domain Ddos Detection Methods Based On Trusted Flmentioning
confidence: 99%
See 2 more Smart Citations
“…We use tools and scripts to simulate attacks and normal flow [ 5 ], shown as Table 2 . For example, SlowHTTPTest is used to simulate slow headers, slow body, and slow headers belong to LDDoS attacks by setting the content length of the application layer to be large or the sending rate parameter to be lower than the expected rate, so as to continuously occupy HTTP connection sessions.…”
Section: Multi-domain Ddos Detection Methods Based On Trusted Flmentioning
confidence: 99%
“…From the perspective of detection methods, these methods can be divided into supervised ML or unsupervised ML [ 19 ], offline detection or real-time online detection [ 20 ]. In addition, the existing DDoS detection methods [ 5 , 6 , 7 , 8 , 21 , 22 ] only aim at a specific category of attack, such as application layer DDoS attack, and lack a comprehensive method to detect different categories of DDoS as a whole. In a word, the above methods usually require a large number of training sets, especially for the purpose of achieving a variety of attack categories, so the ML model trained in a single domain is difficult to achieve high detection ability.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…User traffic detection is another important way to improve network security. According to the way of traffic detection, it can be divided into methods-based statistical methods and methods based on machine learning methods [24]. In recent years, the development of blockchain has enabled more and more scholars to build detection models in blockchain networks based on existing traffic detection technologies.…”
Section: Blockchain-based Traffic Detection Methodmentioning
confidence: 99%
“…For example, in [ 26 ], the author built self-generated dataset by simulating traffic attacks on an experimental platform, used it to train neural networks, combined the trained model and statistics detection model to detect network traffic, and reported detection results in real time. This method is well suited for deployment in our system.…”
Section: Module Designmentioning
confidence: 99%