DDoS Detection Algorithm Based on Fuzzy Logic
Title | DDoS Detection Algorithm Based on Fuzzy Logic |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Ateş, Ç, Özdel, S., Anarim, E. |
Conference Name | 2020 28th Signal Processing and Communications Applications Conference (SIU) |
Date Published | Oct. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-7206-4 |
Keywords | anomaly detection, attack traffic, Computer crime, computer network security, Cyber physical system, DDoS detection, DDoS detection algorithm, DDoS intrusion detection approach, detection stage, Entropy, fuzzy clustering, Fuzzy logic, fuzzy relevance function, graph based features, graphics-based features, Histograms, Internet, Internet technologies, Intrusion detection, IP, IP networks, Metrics, nonattack traffic, pubcrawl, resilience, Resiliency, security, service attacks, telecommunication traffic, Uncertainty |
Abstract | While internet technologies are developing day by day, threats against them are increasing at the same speed. One of the most serious and common types of attacks is Distributed Denial of Service (DDoS) attacks. The DDoS intrusion detection approach proposed in this study is based on fuzzy logic and entropy. The network is modeled as a graph and graphics-based features are used to distinguish attack traffic from non-attack traffic. Fuzzy clustering is applied based on these properties to indicate the tendency of IP addresses or port numbers to be in the same cluster. Based on this uncertainty, attack and non-attack traffic were modeled. The detection stage uses the fuzzy relevance function. This algorithm was tested on real data collected from Bogazici University network. |
URL | https://ieeexplore.ieee.org/document/9302139 |
DOI | 10.1109/SIU49456.2020.9302139 |
Citation Key | ates_ddos_2020 |
- Histograms
- uncertainty
- telecommunication traffic
- service attacks
- security
- Resiliency
- resilience
- pubcrawl
- nonattack traffic
- Metrics
- IP networks
- IP
- Intrusion Detection
- Internet technologies
- internet
- Anomaly Detection
- graphics-based features
- graph based features
- fuzzy relevance function
- Fuzzy logic
- fuzzy clustering
- Entropy
- detection stage
- DDoS intrusion detection approach
- DDoS detection algorithm
- DDoS detection
- Cyber Physical System
- computer network security
- Computer crime
- attack traffic