<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DDoS Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/ddos/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/ddos/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Mon, 25 May 2020 07:16:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Going deep: How advances in machine learning can improve DDoS attack detection</title>
		<link>https://www.aiuniverse.xyz/going-deep-how-advances-in-machine-learning-can-improve-ddos-attack-detection/</link>
					<comments>https://www.aiuniverse.xyz/going-deep-how-advances-in-machine-learning-can-improve-ddos-attack-detection/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Mon, 25 May 2020 07:16:38 +0000</pubDate>
				<category><![CDATA[Machine Learning]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cyber-attacks]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Deep Dives]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=8998</guid>

					<description><![CDATA[<p>Source: portswigger.net A group of researchers from the US, China, and Saudi Arabia, have demonstrated how artificial intelligence (AI) algorithms can help detect distributed denial-of-Service (DDoS) attacks <a class="read-more-link" href="https://www.aiuniverse.xyz/going-deep-how-advances-in-machine-learning-can-improve-ddos-attack-detection/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/going-deep-how-advances-in-machine-learning-can-improve-ddos-attack-detection/">Going deep: How advances in machine learning can improve DDoS attack detection</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: portswigger.net</p>



<p>A group of researchers from the US, China, and Saudi Arabia, have demonstrated how artificial intelligence (AI) algorithms can help detect distributed denial-of-Service (DDoS) attacks where other methods fail.</p>



<p>With the number of internet-connected devices growing at an exponential rate and attackers becoming more sophisticated in their methods, finding and filtering out harmful DDoS traffic against web servers is becoming a mounting challenge.</p>



<p>Their method, presented in a paper published on the open science platform Europe PMC, uses deep learning to determine whether network traffic coming from a source is normal or part of a malicious DDoS attack.</p>



<p>The researchers’ findings show that when dealing with large-scale data, deep learning-based detection methods improve speed and accuracy while reducing false alarm rates.</p>



<p>The work focuses on software-defined networks (SDN), a networking paradigm that has gained popularity in recent years.</p>



<p>SDN provides flexible virtualization capabilities that fulfill the growing demands of cloud computing, mobile networks, and internet of things (IoT).</p>



<p>However, SDN and OpenFlow, the protocol often used to enable communications between SDN controllers and network devices such as switches and routers, are vulnerable to DDoS attacks, as many researchers have found.</p>



<h3 class="wp-block-heading">Rule-based detection failures</h3>



<p>The classical way to detect DDoS is to compare incoming network traffic against a predefined set of rules that can separate normal from attack traffic.</p>



<p>But setting rules for DDoS detection is very difficult due to the diversity of DDoS attack schemes and the difficulty of defining thresholds between normal and malicious traffic.</p>



<p>“In practice, there is no clear distinction between normal traffic and attack traffic,” the authors of the paper note, adding that it would practically be impossible for humans to analyze the huge volume of data running through networks to find the correct rules.</p>



<h3 class="wp-block-heading">Tackling DDoS with deep learning</h3>



<p>Instead of manually perusing data, the authors propose to analyze it with deep neural networks (DNNs).</p>



<p>DNNs, which roughly imitate the workings of their biological counterparts, ingest large amounts of data and find relevant patterns, which they transform into complex mathematical representations.</p>



<p>They can then use this model to classify new incoming data or predict the next piece of information in a sequence.</p>



<p>In the case of DDoS, the researchers treat it as a classification problem. The goal of the algorithm is to determine, on a scale of 0 to 1, how likely incoming traffic from a node in the network is malicious, or, as the researchers put it, “judging whether the characteristic data of the OpenFlow flow table is normal or not”.</p>



<p>By analyzing reams of data, a well-trained deep learning model will be able to glean intricate characteristics of safe and malicious traffic that would have otherwise gone undetected to a human analyst.</p>



<p>The neural network was trained on a large dataset comprised of both normal and malicious table entries, and then tested against five different types of DDoS attacks, including various traffic flooding attacks and slow-connection HTTP attacks, where attackers try to bog down a server by sending it very lengthy requests.</p>



<p>As is true for most deep learning uses, developing a reliable DDoS detection model depends largely on gathering enough quality training data.</p>



<p>As the authors note:</p>



<p>In the case of a small data scale, the relevance ratio of the DL model in the face of flooding attacks has a slight advantage [in comparison to traditional detection methods], but it has not shown its detection advantage in other aspects. The detection performance is not outstanding.</p>



<p>But as the system was scaled to larger datasets, the researchers found that the deep learning model eventually became more accurate and made fewer errors than other established DDoS detection tools, including those based on other machine learning algorithms, including support vector machines (SVM) and decision trees.</p>



<h3 class="wp-block-heading">Human support needed</h3>



<p>Deep learning systems are very good at handling classification and prediction tasks, as long as they’re dealing with data that is statistically similar to their training examples.</p>



<p>But as soon as they meet novel situations that vary from what they’ve previously seen, they behave in unexpected ways.</p>



<p>“Although some achievements have been obtained in this research, there are still some shortcomings,” the authors of the paper note. “The DL model of this research also needs a certain degree of human adjustment, and it cannot be completely intelligent.”</p>



<p>The paper has not been peer-reviewed, and the authors have not released the code and data for examination by industry experts, so it’s hard to independently verify the accuracy of their model.</p>



<p>But using machine learning algorithms to address the growing threat of DDoS attacks has become a growing area of interest, and several projects have already shown promising results.</p>



<p>Other efforts in the field range from simple machine learning models that detect compromised IoT devices in networks to SVM models that analyze OpenFlow tables for malicious behavior.</p>
<p>The post <a href="https://www.aiuniverse.xyz/going-deep-how-advances-in-machine-learning-can-improve-ddos-attack-detection/">Going deep: How advances in machine learning can improve DDoS attack detection</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/going-deep-how-advances-in-machine-learning-can-improve-ddos-attack-detection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Machine Learning Is Chasing Out DDoS, The Newest Evil In Cyber Security</title>
		<link>https://www.aiuniverse.xyz/machine-learning-is-chasing-out-ddos-the-newest-evil-in-cyber-security/</link>
					<comments>https://www.aiuniverse.xyz/machine-learning-is-chasing-out-ddos-the-newest-evil-in-cyber-security/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Mon, 20 Aug 2018 06:24:48 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DDoS attack]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[ML techniques]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=2765</guid>

					<description><![CDATA[<p>Source &#8211; analyticsindiamag.com One of the most dangerous aspects looming the computer world is security threats. It is estimated that around three trillion dollars are lost in cyber crimes every <a class="read-more-link" href="https://www.aiuniverse.xyz/machine-learning-is-chasing-out-ddos-the-newest-evil-in-cyber-security/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/machine-learning-is-chasing-out-ddos-the-newest-evil-in-cyber-security/">Machine Learning Is Chasing Out DDoS, The Newest Evil In Cyber Security</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; analyticsindiamag.com</p>
<p>One of the most dangerous aspects looming the computer world is security threats. It is estimated that around three trillion dollars are lost in cyber crimes every year. This figure is expected to double by 2021. With all of these threats lurking around, it is difficult to track and eliminate every threat, especially as the number of users is rising exponentially.</p>
<p>The most popular among the existing cyber threats now is the distributed denial of service (DDoS) attack. A DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of the internet traffic. DDoS attacks have adversely affected businesses on a large scale.</p>
<p>Now, with machine learning prevailing in the tech ecosystem, eliminating DDoS attacks has found a new way. In this article, we will lay out a research paper that has used ML techniques to subdue DDoS attacks in systems.</p>
<h3>Session Initiation Protocol (SIP) And Voice Over Internet Protocol (VoIP)</h3>
<p>Z Tsiatsikas and a team from the University of the Aegean, Greece, have published a new research study in countering DDoS in SIP-based VoIP systems through ML. The reason for choosing VoIP systems is its popularity and spread in the hardware ecosystem. With the growing number of digital devices and the abundant availability of the internet, VoIP is the preferred method for voice and multimedia communications.</p>
<p>In order to establish a VoIP session, Session Initiation Protocol (SIP) is the popular means of initiating and these sessions. A simple version of the SIP/VoIP architecture is given below:</p>
<ul>
<li><b>User Agent (UA):</b> The active entities in the session which represent the endpoints of SIP. For example, in the context of voice communications, the caller and the receiver, which denote the endpoints in the session.</li>
<li><b>SIP Proxy Server: An intermediate entity which acts as a client and a server simultaneously during the session. The role of this server is to maintain send and receive requests as well as transfer information to and fro from the users.</b></li>
<li><b></b><strong>Registrar:</strong> This component takes care of authentication and register requests for the UA.</li>
</ul>
<p>All of the SIP communication is logged by the VoIP provider. This is important because it gives out billing and accounting information for service providers based on users’ activity. Interestingly, it can also give out information regarding intrusion or suspicious activity present in the network. This can be a breeding ground for DDoS attacks if left neglected.</p>
<h3>Aggregating ML Techniques In VoIP</h3>
<p>The researchers consider the same SIP VoIP architecture and use five standard ML classifier algorithms in their experiments, which are as follows:</p>
<ol>
<li>Sequential minimal optimisation</li>
<li>Naive Bayes</li>
<li>Neural networks</li>
<li>Decision trees</li>
<li>Random Forest</li>
</ol>
<p>These algorithms are set up for dealing with communications directly in the experiment. Then, classification features are generated once the network is made anonymous using keyed-hash method authentication code (HMAC) for the VoIP communications. The algorithms are tested under 15 DDoS attack scenarios. In order to do this, a ‘test bed’ of DDoS simulations is designed by the researchers which is shown below:</p>
<figure id="attachment_27426" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="wp-image-27426 size-full" src="https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?resize=835%2C591&amp;ssl=1" sizes="(max-width: 835px) 100vw, 835px" srcset="https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?w=835&amp;ssl=1 835w, https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?resize=768%2C544&amp;ssl=1 768w, https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?resize=770%2C545&amp;ssl=1 770w" alt="" width="672" height="476" data-attachment-id="27426" data-permalink="https://www.analyticsindiamag.com/machine-learning-chasing-out-ddos-cyber-security/ddos1/" data-orig-file="https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?fit=835%2C591&amp;ssl=1" data-orig-size="835,591" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="ddos1" data-image-description="" data-medium-file="https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?fit=300%2C300&amp;ssl=1" data-large-file="https://i2.wp.com/www.analyticsindiamag.com/wp-content/uploads/2018/08/ddos1.jpg?fit=835%2C591&amp;ssl=1" /><figcaption class="wp-caption-text"><em>DDoS simulation test-bed (Image courtesy: Z Tsiatsikas and researchers)</em></figcaption></figure>
<p><i>“Three or four different Virtual Machines (VMs) have been used for the SIP proxy, the legitimate users, and the generation of the attack traffic depending on the scenario. All VMs run on an i7 processor 2.2 GHz machine having 6GB of RAM. For the SIP proxy, we employed the widely known VoIP server </i><i>Kamailio</i><i> (kam, 2014). We simulated distinct patterns for both legitimate and DoS attack traffic using sipp v.3.21 and sipsak2 tools respectively. Furthermore, for the simulation of DDoS attack, the SIPp-DD tool has been used. The well-known Weka tool has been employed for ML analysis.”</i></p>
<p>Training and Testing process for algorithms include both normal traffic and attack traffic. To simulate the attack traffic, they use a range of random high call rates to give a feel of real VoIP whereas the normal traffic has normal, observed call rates.</p>
<p>The training scenario in the experiment is denoted as SN1 and testing scenarios are denoted as SN1.1, SN1.2, SN1.3 etc. A detailed description is given here.</p>
<h3>Performance</h3>
<p>The algorithms fare well compared to non-ML detection. Among the algorithms, Random Forest and decision trees stand top when measured from an intrusion detection viewpoint. The other three fare below them. In addition, as the attack traffic rises, the intrusion detection rate drops, which means DDoS is evident. Ultimately, ML techniques outclass conventional attack detection techniques/methods.</p>
<p>The post <a href="https://www.aiuniverse.xyz/machine-learning-is-chasing-out-ddos-the-newest-evil-in-cyber-security/">Machine Learning Is Chasing Out DDoS, The Newest Evil In Cyber Security</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/machine-learning-is-chasing-out-ddos-the-newest-evil-in-cyber-security/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
	</channel>
</rss>
