Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2016, Article ID 1467051, 10 pages
http://dx.doi.org/10.1155/2016/1467051
Research Article

A Novel Real-Time DDoS Attack Detection Mechanism Based on MDRA Algorithm in Big Data

Bin Jia,1,2,3 Yan Ma,1 Xiaohong Huang,1 Zhaowen Lin,1,2,3 and Yi Sun2,3,4

1Information and Network Center, Institute of Network Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
2Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory, Shijiazhuang 050081, China
3National Engineering Laboratory for Mobile Network Security (No. [2013] 2685), Beijing 100876, China
4Network and Information Center, Institute of Network Technology and Institute of Sensing Technology and Business, Beijing University of Posts and Telecommunications, Beijing 100876, China

Received 25 March 2016; Revised 25 July 2016; Accepted 10 August 2016

Academic Editor: Nazrul Islam

Copyright © 2016 Bin Jia et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. J. Criscuolo, Distributed Denial of Service: Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319, Lawrence Livermore National Laboratory, 2000.
  2. M. Kim, H. Na, and K. Chae, “A combined data mining approach for DDoS attack detection,” in Information Networking. Networking Technologies for Broadband and Mobile Networks, vol. 3090 of Lecture Notes in Computer Science, pp. 943–950, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  3. A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, “Non-Gaussian and long memory statistical characterizations for Internet traffic with anomalies,” IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 1, pp. 56–70, 2007. View at Publisher · View at Google Scholar · View at Scopus
  4. K. Lee, J. Kim, K. H. Kwon, Y. Han, and S. Kim, “DDoS attack detection method using cluster analysis,” Expert Systems with Applications, vol. 34, no. 3, pp. 1659–1665, 2008. View at Publisher · View at Google Scholar · View at Scopus
  5. H. V. Nguyen and Y. Choi, “Proactive detection of DDoS attacks utilizing k-NN classifier in an anti-DDoS framework,” World Academy of Science, Engineering and Technology, International Science Index, vol. 4, no. 3, pp. 247–252, 2010. View at Google Scholar
  6. C.-F. Tsai and C.-Y. Lin, “A triangle area based nearest neighbors approach to intrusion detection,” Pattern Recognition, vol. 43, no. 1, pp. 222–229, 2010. View at Publisher · View at Google Scholar · View at Scopus
  7. A. Bhange, A. Syad, and S. Singh Thakur, “DDoS attacks impact on network traffic and its detection approach,” International Journal of Computer Applications, vol. 40, no. 11, pp. 36–40, 2012. View at Publisher · View at Google Scholar
  8. Z. Y. Tan, A. Jamdagni, X. J. He, P. Nanda, and R. P. Liu, “A system for denial-of-service attack detection based on multivariate correlation analysis,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 447–456, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. J. Luo, X. Yang, J. Wang, J. Xu, J. Sun, and K. Long, “On a mathematical model for low-rate shrew DDoS,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 7, pp. 1069–1083, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Hotelling, “Analysis of a complex of statistical variables into principal components,” Journal of Educational Psychology, vol. 24, no. 6, pp. 417–441, 1933. View at Publisher · View at Google Scholar · View at Scopus
  11. A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: existing solutions and latest technological trends,” Computer Networks, vol. 51, no. 12, pp. 3448–3470, 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. G. Liu, Z. Yi, and S. Yang, “A hierarchical intrusion detection model based on the PCA neural networks,” Neurocomputing, vol. 70, no. 7–9, pp. 1561–1568, 2007. View at Publisher · View at Google Scholar · View at Scopus
  13. Y. Kanda, K. Fukuda, and T. Sugawara, “Evaluation of anomaly detection based on sketch and PCA,” in Proceedings of the 53rd IEEE Global Telecommunications Conference (GLOBECOM '10), pp. 1–5, IEEE, Miami, Fla, USA, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. Y. Zhang and L. Wu, “An MR brain images classifier via principal component analysis and kernel support vector machine,” Progress in Electromagnetics Research, vol. 130, pp. 369–388, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. Z. Tan, A. Jamdagni, X. He, P. Nanda, and R. P. Liu, “Denial-of-service attack detection based on multivariate correlation analysis,” in Neural Information Processing, pp. 756–765, Springer, Berlin, Germany, 2011. View at Google Scholar
  16. Z. Tan, A. Jamdagni, X. J. He, P. Nanda, and R. P. Liu, “Triangle-area-based multivariate correlation analysis for effective denial-of-service attack detection,” in Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '12), pp. 33–40, IEEE, Liverpool, UK, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, “Cost-based modeling for fraud and intrusion detection: results from the JAM project,” in Proceedings of the DARPA information survivability conference and exposition (DISCEX '00), pp. 130–144, Hilton Head, SC, USA, 2000. View at Publisher · View at Google Scholar
  18. R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, “The 1999 DARPA off-line intrusion detection evaluation,” Computer Networks, vol. 34, no. 4, pp. 579–595, 2000. View at Publisher · View at Google Scholar · View at Scopus
  19. J. McHugh, “Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory,” ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262–294, 2000. View at Publisher · View at Google Scholar
  20. S. Stofo, The Third International Knowledge Discovery and Data Mining Tools Competition, The University of California, 2002, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
  21. S. Mukkamala, A. H. Sung, and A. Abraham, “Intrusion detection using an ensemble of intelligent paradigms,” Journal of Network and Computer Applications, vol. 28, no. 2, pp. 167–182, 2005. View at Publisher · View at Google Scholar · View at Scopus
  22. K.-C. Khor, C.-Y. Ting, and S. Phon-Amnuaisuk, “A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection,” Applied Intelligence, vol. 36, no. 2, pp. 320–329, 2012. View at Publisher · View at Google Scholar · View at Scopus
  23. P. Prasenna, A. V. T. Raghav Ramana, R. Krishna Kumar, and A. Devanbu, “Network programming and mining classifier for intrusion detection using probability classification,” in Proceedings of the International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME '12), pp. 204–209, IEEE, Salem, Tamilnadu, March 2012.
  24. C. Bae, W.-C. Yeh, M. A. M. Shukran, Y. Y. chung, and T.-J. Hsieh, “A novel anomaly-network intrusion detection system using ABC algorithms,” International Journal of Innovative Computing, Information and Control, vol. 8, no. 12, pp. 8231–8248, 2012. View at Google Scholar · View at Scopus
  25. W. Wang, X. Zhang, S. Gombault, and S. J. Knapskog, “Attribute normalization in network intrusion detection,” in Proceedings of the 10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN '09), pp. 448–453, December 2009. View at Publisher · View at Google Scholar · View at Scopus