A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment

Distributed Denial of Service (DDoS) has developed multiple variants, one of which is Distributed Reflective Denial of Service (DRDoS). With the increasing number of Internet of Things (IoT) devices, the threat of DRDoS attack is growing, and the damage of a DRDoS attack is more destructive than oth...

Full description

Bibliographic Details
Main Authors: Ruomeng Xu, Jieren Cheng, Fengkai Wang, Xiangyan Tang, Jinying Xu
Format: Article
Language:English
Published: MDPI AG 2019-01-01
Series:Symmetry
Subjects:
Online Access:http://www.mdpi.com/2073-8994/11/1/78
_version_ 1817988804640768000
author Ruomeng Xu
Jieren Cheng
Fengkai Wang
Xiangyan Tang
Jinying Xu
author_facet Ruomeng Xu
Jieren Cheng
Fengkai Wang
Xiangyan Tang
Jinying Xu
author_sort Ruomeng Xu
collection DOAJ
description Distributed Denial of Service (DDoS) has developed multiple variants, one of which is Distributed Reflective Denial of Service (DRDoS). With the increasing number of Internet of Things (IoT) devices, the threat of DRDoS attack is growing, and the damage of a DRDoS attack is more destructive than other types. The existing DDoS detection methods cannot be generalized in DRDoS early detection, which leads to heavy load or degradation of service when deployed at the final point. In this paper, we propose a DRDoS detection and defense method based on deep forest model (DDDF), and then we integrate differentiated service into defense model to filter out DRDoS attack flow. Firstly, from the statistics perspective on different stages of DRDoS attack flow in the big data environment, we extract a host-based DRDoS threat index (HDTI) from the network flows. Secondly, using the HDTI feature we build a DRDoS detection and defense model based on the deep forest, which consists of 1 extreme gradient boost (XGBoost) forest estimator, 2 random forest estimators, and 2 extra random forest estimators in each layer. Lastly, the differentiated service procedure applies the detection result from DDDF to drop the traffic identified in different stages and different detection points. Theoretical analysis and experiments show that the method we proposed can effectively identify DRDoS attack with higher detection rate and a lower false alarm rate, the defense model also shows distinguishing ability to effectively eliminate the DRDoS attack flows, and dramatically mitigate the damage of a DRDoS attack.
first_indexed 2024-04-14T00:39:01Z
format Article
id doaj.art-b99d32d1b35e48cd9bbe9866fa1e22d6
institution Directory Open Access Journal
issn 2073-8994
language English
last_indexed 2024-04-14T00:39:01Z
publishDate 2019-01-01
publisher MDPI AG
record_format Article
series Symmetry
spelling doaj.art-b99d32d1b35e48cd9bbe9866fa1e22d62022-12-22T02:22:16ZengMDPI AGSymmetry2073-89942019-01-011117810.3390/sym11010078sym11010078A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data EnvironmentRuomeng Xu0Jieren Cheng1Fengkai Wang2Xiangyan Tang3Jinying Xu4School of Information Science and Technology, Hainan University, Haikou 570228, ChinaSchool of Information Science and Technology, Hainan University, Haikou 570228, ChinaRossier School, University of Southern California, California, CA 90089, USASchool of Information Science and Technology, Hainan University, Haikou 570228, ChinaZhejiang Science and Technology Information Institute, Hangzhou 310006, ChinaDistributed Denial of Service (DDoS) has developed multiple variants, one of which is Distributed Reflective Denial of Service (DRDoS). With the increasing number of Internet of Things (IoT) devices, the threat of DRDoS attack is growing, and the damage of a DRDoS attack is more destructive than other types. The existing DDoS detection methods cannot be generalized in DRDoS early detection, which leads to heavy load or degradation of service when deployed at the final point. In this paper, we propose a DRDoS detection and defense method based on deep forest model (DDDF), and then we integrate differentiated service into defense model to filter out DRDoS attack flow. Firstly, from the statistics perspective on different stages of DRDoS attack flow in the big data environment, we extract a host-based DRDoS threat index (HDTI) from the network flows. Secondly, using the HDTI feature we build a DRDoS detection and defense model based on the deep forest, which consists of 1 extreme gradient boost (XGBoost) forest estimator, 2 random forest estimators, and 2 extra random forest estimators in each layer. Lastly, the differentiated service procedure applies the detection result from DDDF to drop the traffic identified in different stages and different detection points. Theoretical analysis and experiments show that the method we proposed can effectively identify DRDoS attack with higher detection rate and a lower false alarm rate, the defense model also shows distinguishing ability to effectively eliminate the DRDoS attack flows, and dramatically mitigate the damage of a DRDoS attack.http://www.mdpi.com/2073-8994/11/1/78DRDoSdeep forestIoTbig datadifferentiated service
spellingShingle Ruomeng Xu
Jieren Cheng
Fengkai Wang
Xiangyan Tang
Jinying Xu
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment
Symmetry
DRDoS
deep forest
IoT
big data
differentiated service
title A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment
title_full A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment
title_fullStr A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment
title_full_unstemmed A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment
title_short A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment
title_sort drdos detection and defense method based on deep forest in the big data environment
topic DRDoS
deep forest
IoT
big data
differentiated service
url http://www.mdpi.com/2073-8994/11/1/78
work_keys_str_mv AT ruomengxu adrdosdetectionanddefensemethodbasedondeepforestinthebigdataenvironment
AT jierencheng adrdosdetectionanddefensemethodbasedondeepforestinthebigdataenvironment
AT fengkaiwang adrdosdetectionanddefensemethodbasedondeepforestinthebigdataenvironment
AT xiangyantang adrdosdetectionanddefensemethodbasedondeepforestinthebigdataenvironment
AT jinyingxu adrdosdetectionanddefensemethodbasedondeepforestinthebigdataenvironment
AT ruomengxu drdosdetectionanddefensemethodbasedondeepforestinthebigdataenvironment
AT jierencheng drdosdetectionanddefensemethodbasedondeepforestinthebigdataenvironment
AT fengkaiwang drdosdetectionanddefensemethodbasedondeepforestinthebigdataenvironment
AT xiangyantang drdosdetectionanddefensemethodbasedondeepforestinthebigdataenvironment
AT jinyingxu drdosdetectionanddefensemethodbasedondeepforestinthebigdataenvironment