A Multi-classifiers Based Novel DoS/DDoS Attack Detection Using Fuzzy Logic

Author(s):  
Jatin Patel ◽  
Vijay Katkar
2021 ◽  
Author(s):  
Beslin Pajila ◽  
E. Golden Julie ◽  
Y. Harold Robinson

Abstract Wireless sensor networks (WSN) is considering as one of the exploring technology. WSN has a large number of sensor nodes, which sense the environment and collect the data. The collected data are sending to the sink through the intermediate nodes. Since the sensors node data are exposed to the internet, there is a possibility of vulnerability in the WSN. The common attack that affects most of the sensor nodes is the DDoS attack. In this paper aims to identify the DDoS attack quickly and to recover sensors using the fuzzy logic mechanism. In the Fuzzy based DDoS attack Detection and Recovery mechanism (FBDR) method uses type 1 fuzzy-logic to detect the occurrence of DDoS attack in a node. Similarly fuzzy- type 2 is used for recovery DDoS attack. Both the type 1 fuzzy-based rule and type 2 fuzzy-based rule perform well in terms of identifying the DDoS attack and recover the DDoS attack. It also helps to reduce the energy consumption of each node and improves the lifetime of the network. The proposed FBDR scheme is compared with other related schemes. The experimental results represent that the FBDR method works better than other similar schemes.


Author(s):  
Shanshan Yu ◽  
Jicheng Zhang ◽  
Ju Liu ◽  
Xiaoqing Zhang ◽  
Yafeng Li ◽  
...  

AbstractIn order to solve the problem of distributed denial of service (DDoS) attack detection in software-defined network, we proposed a cooperative DDoS attack detection scheme based on entropy and ensemble learning. This method sets up a coarse-grained preliminary detection module based on entropy in the edge switch to monitor the network status in real time and report to the controller if any abnormality is found. Simultaneously, a fine-grained precise attack detection module is designed in the controller, and a ensemble learning-based algorithm is utilized to further identify abnormal traffic accurately. In this framework, the idle computing capability of edge switches is fully utilized with the design idea of edge computing to offload part of the detection task from the control plane to the data plane innovatively. Simulation results of two common DDoS attack methods, ICMP and SYN, show that the system can effectively detect DDoS attacks and greatly reduce the southbound communication overhead and the burden of the controller as well as the detection delay of the attacks.


Sign in / Sign up

Export Citation Format

Share Document