Abstract
Denial of service (DoS) attack is the menace to private cloud computing environment that denies services provided by cloud servers leading to huge business losses. Efficient DoS attack detection mechanisms are demanded which necessitates the extraction of features for its best performance. The lacuna in the existing feature extraction based detection systems is the sensitiveness of initial cluster center which leads to high false alarm rate and low accuracy. In this paper, this issue is addressed by proposing a class center based triangle area vector (CCTAV) method which computes the mean of target classes individually and extracts the correlation between features. Mahalanobis distance measure is used for profile construction and DoS attacks detection. The proposed CCTAV method is tested with five publicly available datasets and compared with existing methods. It is noticed that the proposed statistical method reduces the complexity of feature extraction and enhances the attack detection process. The proposed approach is evaluated by conducting tenfold cross validation to compute 95% confidence interval. It is evident that the accuracy obtained for all the datasets are within the confidence interval. Further, the proposed CCTAV method provides significant results compared to the state-of-the-art attack detection methods.







Similar content being viewed by others
References
Somani, G., Gaur, M.S., Sanghi, D., Conti, M., Buyya, R.: Ddos attacks in cloud computing: issues, taxonomy, and future directions. Comput. Commun. 107, 30 (2017). https://doi.org/10.1016/j.comcom.2017.03.010
Velliangiri, S., Premalatha, J.: Intrusion detection of distributed denial of service attacks in cloud. Cluster Comput. (2017). https://doi.org/10.1007/s10586-017-1149-0
Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat ddos attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245 (2014). https://doi.org/10.1109/TPDS.2013.181
Iot is a new backdoor for ddos attacks. https://www.grtcorp.com (2018).
P. Kasinathan, C. Pastrone, M.A. Spirito, M. Vinkovits, Denial of service detection in 6LoWPAN based Internet of things. In: 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob) (IEEE, 2013), pp. 600–607.
Akamai [State of the Internet]/Security q3 2017 Report. https://www.prnewswire.com (2017)
Hoque, N., Bhuyan, M.H., Baishya, R.C., Bhattacharyya, D.K., Kalita, J.K.: Network attacks: taxonomy, tools and systems. J. Netw. Comput. Appl. 40, 307 (2014). https://doi.org/10.1016/j.jnca.2013.08.001
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R.P.: A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Trans. Parallel Distrib. Syst. 25(2), 447 (2014). https://doi.org/10.1109/TPDS.2013.146
Derhab, A., Bouras, A.: Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems. Secur. Commun. Netw. 8(7), 1193 (2015). https://doi.org/10.1002/sec.1074
Weller-Fahy, D.J., Borghetti, B.J., Sodemann, A.A.: A survey of distance and similarity measures used within network intrusion anomaly detection. IEEE Commun. Surv. Tutor. 17(1), 70 (2015). https://doi.org/10.1109/COMST.2014.2336610
Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153 (2016). https://doi.org/10.1109/COMST.2015.2494502
Prasad, K.M., Reddy, A.R.M., Rao, K.V.: Defad: ensemble classifier for ddos enabled flood attack defense in distributed network environment. Cluster Comput. 21(4), 1765 (2018). https://doi.org/10.1007/s10586-018-2808-5
Taheri, R., Javidan, R., Shojafar, M., Conti, M., et al.: Can machine learning model with static features be fooled: an adversarial machine learning approach. Cluster Comput. (2020). https://doi.org/10.1007/s10586-020-03083-5
Doriguzzi-Corin, R., Millar, S., Scott-Hayward, S., Martinez-del Rincon, J., Siracusa, D.: Lucid: a practical, lightweight deep learning solution for ddos attack detection. IEEE Trans. Netw. Serv. Manage. (2020). https://doi.org/10.1109/TNSM.2020.2971776
Tsai, C.F., Lin, C.Y.: A triangle area based nearest neighbors approach to intrusion detection. Pattern Recogn. 43(1), 222 (2010). https://doi.org/10.1016/j.patcog.2009.05.017
Lin, W.C., Ke, S.W., Tsai, C.F.: Cann: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl. Based Syst. 78, 13 (2015). https://doi.org/10.1016/j.knosys.2015.01.009
Moustafa, M., Slay, J., Creech, G.: Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Trans. Big Data (2017). https://doi.org/10.1109/TBDATA.2017.2715166
Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16(1), 303 (2014). https://doi.org/10.1109/SURV.2013.052213.00046
Zlomislic, V., Fertalj, K., Sruk, V.: Denial of service attacks, defences and research challenges. Cluster Comput. 20(1), 661 (2017). https://doi.org/10.1007/s10586-017-0730-x
Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046 (2013). https://doi.org/10.1109/SURV.2013.031413.00127
Somani, G., Gaur, M.S., Sanghi, D., Conti, M.: Ddos attacks in cloud computing: collateral damage to non-targets. Comput. Netw. 109, 157 (2016). https://doi.org/10.1016/j.comnet.2016.03.022
Yan, Q., Yu, F.R., Gong, Q., Li, J.: Software-defined networking (sdn) and distributed denial of service (ddos) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun. Surv. Tutor. 18(1), 602 (2016). https://doi.org/10.1109/COMST.2015.2487361
Bharot, N., Verma, P., Sharma, S., Suraparaju, V.: Distributed denial-of-service attack detection and mitigation using feature selection and intensive care request processing unit. Arab. J. Sci. Eng. 43(2), 959 (2018). https://doi.org/10.1007/s13369-017-2844-0
M. Tavallaee, E. Bagheri, W. Lu, A.A. Ghorbani: A detailed analysis of the KDD Cup 99 dataset. In Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on (IEEE, 2009), pp. 53–58. 10.1109/CISDA.2009.5356528
Iglesias, F., Zseby, T.: Analysis of network traffic features for anomaly detection. Mach. Learn. 101(13), 59 (2015). https://doi.org/10.1007/s10994-014-5473-9
Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf. Secur. J. 25(13), 18 (2016). https://doi.org/10.1080/19393555.2015.1125974
Cicids 2017. https://www.unb.ca/cic/datasets/ids-2017.html (2017)
Cse-cic-ids 2018. https://www.unb.ca/cic/datasets/ids-2018.html (2018)
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R.P., Hu, J.: Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans. Comput. 64(9), 2519 (2015). https://doi.org/10.1109/TC.2014.2375218
Celebi, M.E., Kingravi, H.A., Vela, P.A.: A comparative study of efficient initialization methods for the k-means clustering algorithm. Expert Syst. Appl. 40(1), 200 (2013). https://doi.org/10.1016/j.eswa.2012.07.021
Guo, C., Zhou, Y., Ping, Y., Zhang, Z., Liu, G., Yang, Y.: A distance sum-based hybrid method for intrusion detection. Appl. Intell. 40(1), 178 (2014). https://doi.org/10.1007/s10489-013-0452-6
Jin, S., Yeung, D.S., Wang, X.: Network intrusion detection in covariance feature space. Pattern Recogn. 40(8), 2185 (2007). https://doi.org/10.1016/j.patcog.2006.12.010
Deza, M.M., Deza, E.: Encyclopedia of Distances, pp. 1–583. Springer, New York (2009)
H.H. Chang, M.C. Lee, N. Chen, C.L. Chien, W.J. Lee: Feature extraction based Hellinger distance algorithm for non-intrusive aging load identification in residential buildings. In: Industry Applications Society Annual Meeting, 2015 IEEE (IEEE, 2015), pp. 1–8. 10.1109/IAS.2015.7356778
Z. Tan, A. Jamdagni, X. He, P. Nanda, R.P. Liu: Multivariate correlation analysis technique based on Euclidean distance map for network traffic characterization. In: International Conference on Information and Communications Security (Springer, 2011), pp. 388–398
Jamdagni, A., Tan, Z., He, X., Nanda, P., Liu, R.P.: Repids: a multi tier real-time payload-based intrusion detection system. Comput. Netw. 57(3), 811 (2013). https://doi.org/10.1016/j.comnet.2012.10.002
Han, J., Pei, J., Kamber, M.: Data Mining: Concepts and Techniques. Elsevier, Amsterdam (2011)
I. Sharafaldin, A.H. Lashkari, A.A. Ghorbani: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In ICISSP (2018), pp. 108–116
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. MIT Press, Cambridge (2009)
A. Javaid, Q. Niyaz, W. Sun, M. Alam: A deep learning approach for network intrusion detection system. In Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS) (2016), pp. 21–26
Benmessahel, I., Xie, K., Chellal, M.: A new evolutionary neural networks based on intrusion detection systems using multiverse optimization. Appl. Intell. 48(8), 2315 (2018). https://doi.org/10.1007/s10489-017-1085-y
Idhammad, M., Afdel, K., Belouch, M.: Semi-supervised machine learning approach for ddos detection. Appl. Intell. 48(10), 3193 (2018). https://doi.org/10.1007/s10489-018-1141-2
Ng, B.A., Selvakumar, S.: Deep radial intelligence with cumulative incarnation approach for detecting denial of service attacks. Neurocomputing 340, 294 (2019). https://doi.org/10.1016/j.neucom.2019.02.047
Kdd cup features. https://www.aldapa.eus/res/README.pdf
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix
Illustration of proposed method
This section illustrates the proposed method. For illustrative purpose, only six features as tabulated in Table 7 [44] have been used. The sample data used for illustration is tabulated in Table 8. \(R1\) to \(R13\) represent the records, \(F1\) to \(F6\) represent the features, and Class denotes the target classes. The first step is to compute the CCs for the five classes of the sample data. The CCs for the five classes are computed and tabulated in Table 9. \({C}_{1}\), \({C}_{2}\), \({C}_{3}\), \({C}_{4}\), and \({C}_{5}\) are the CCs for the target classes such as Normal, Back, Neptune, Smurf, and Teardrop respectively. Once the CCs are known, then the TAV for each record is computed. The TAV is a vector that consists of 10 triangle areas. The TAV of record, \({R}_{1}\) is shown as follows:\(\left[{R}_{1}{C}_{1}{C}_{2}, {R}_{1}{C}_{1}{C}_{3},{R}_{1}{C}_{1}{C}_{4}, {R}_{1}{C}_{1}{C}_{5}, {R}_{1}{C}_{2}{C}_{3},{R}_{1}{C}_{2}{C}_{4}, {R}_{1}{C}_{2}{C}_{5},{R}_{1}{C}_{3}{C}_{4}, {R}_{1}{C}_{3}{C}_{5},{R}_{1}{C}_{4}{C}_{5}\right].\)
The first triangle area of record, \({R}_{1}\) as depicted in Fig. 8, i.e., \({R}_{1}{C}_{1}{C}_{2}\) is computed. The triangle points of \({R}_{1}{C}_{1}{C}_{2}\), i.e., \({R}_{1}\), \({C}_{1}\), and \({C}_{2}\) are tabulated in Table 10. The points \(\left({C}_{1}, {C}_{2}\right)\), \(\left({C}_{2}, {R}_{1}\right)\), and \(\left({C}_{1}, {R}_{1}\right)\) are for the sides of the triangle \({S}_{1}\), \({S}_{2}\), and \({S}_{3}\) respectively. The values obtained for three sides of the triangle \({S}_{1}\), \({S}_{2}\), and \({S}_{3}\) are 1.3173, 1.4119, and 0.1374 respectively. The perimeter of the triangle is 2.8666, the semi-perimeter of the triangle is 1.4333, and the triangle area obtained for \({R}_{1}{C}_{1}{C}_{2}\) is 0.0679. Similarly, the three sides of the triangle, perimeter of the triangle, semi-perimeter of the triangle, and the triangle area are obtained for the other 9 triangles. Then, the obtained TAV of \({R}_{1}\) is as follows: [0.0679 0.1025 1.1674 0.0952 1.1473 1.3352 0.0825 0.8647 0.3782 1.0170], which is shown in Fig. 9.
The mean of TAVs of normal traffic is computed and shown in Fig. 10. The profile is generated for detection using the mean TAV of normal records. The generated profile comprises of computed mean, -4.0175 × 108 and the standard deviation, 8.9723 × 108. The threshold, \(Thresh\) for the sample data is computed using the generated profile and tabulated in Table 11 for both the positive range and negative range. The computed profile is tested with two test cases and the test cases are tabulated in Table 12. The values of the test cases are normalized using min–max normalization and the normalized values of the test cases are shown in Table 13. The TAV of test case1 and test case2 are shown in Figs. 11 and 12 respectively. The MahD between TAV of test case1 and mean TAV of normal records is 1.1291 × 104 which lies within the \(Thresh\) and hence it is detected as \(Normal\). The MahD between TAV of test case2 and mean TAV of normal records is -3.9192 × 109–1.9073 × 10−6i which lies beyond the \(Thresh\) and hence it is detected as \(Attack\).
Rights and permissions
About this article
Cite this article
Bhuvaneswari Amma, N.G., Selvakumar, S. A statistical class center based triangle area vector method for detection of denial of service attacks. Cluster Comput 24, 393–415 (2021). https://doi.org/10.1007/s10586-020-03120-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-020-03120-3