• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于深度学习算法的网络流量分布式拒绝服务攻击检测

Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm.

作者信息

Ramzan Mahrukh, Shoaib Muhammad, Altaf Ayesha, Arshad Shazia, Iqbal Faiza, Castilla Ángel Kuc, Ashraf Imran

机构信息

Department of Computer Science, University of Engineering & Technology (UET), Lahore 54890, Pakistan.

Universidad Europea del Atlántico, Isabel Torres 21, 39011 Santander, Spain.

出版信息

Sensors (Basel). 2023 Oct 23;23(20):8642. doi: 10.3390/s23208642.

DOI:10.3390/s23208642
PMID:37896735
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10611275/
Abstract

Internet security is a major concern these days due to the increasing demand for information technology (IT)-based platforms and cloud computing. With its expansion, the Internet has been facing various types of attacks. Viruses, denial of service (DoS) attacks, distributed DoS (DDoS) attacks, code injection attacks, and spoofing are the most common types of attacks in the modern era. Due to the expansion of IT, the volume and severity of network attacks have been increasing lately. DoS and DDoS are the most frequently reported network traffic attacks. Traditional solutions such as intrusion detection systems and firewalls cannot detect complex DDoS and DoS attacks. With the integration of artificial intelligence-based machine learning and deep learning methods, several novel approaches have been presented for DoS and DDoS detection. In particular, deep learning models have played a crucial role in detecting DDoS attacks due to their exceptional performance. This study adopts deep learning models including recurrent neural network (RNN), long short-term memory (LSTM), and gradient recurrent unit (GRU) to detect DDoS attacks on the most recent dataset, CICDDoS2019, and a comparative analysis is conducted with the CICIDS2017 dataset. The comparative analysis contributes to the development of a competent and accurate method for detecting DDoS attacks with reduced execution time and complexity. The experimental results demonstrate that models perform equally well on the CICDDoS2019 dataset with an accuracy score of 0.99, but there is a difference in execution time, with GRU showing less execution time than those of RNN and LSTM.

摘要

如今,由于对基于信息技术(IT)的平台和云计算的需求不断增加,网络安全成为一个主要问题。随着互联网的扩展,它一直面临着各种类型的攻击。病毒、拒绝服务(DoS)攻击、分布式拒绝服务(DDoS)攻击、代码注入攻击和欺骗是现代最常见的攻击类型。由于IT的扩展,网络攻击的数量和严重性最近一直在增加。DoS和DDoS是最常报告的网络流量攻击。诸如入侵检测系统和防火墙之类的传统解决方案无法检测复杂的DDoS和DoS攻击。随着基于人工智能的机器学习和深度学习方法的整合,已经提出了几种用于DoS和DDoS检测的新颖方法。特别是,深度学习模型因其卓越的性能在检测DDoS攻击中发挥了关键作用。本研究采用包括递归神经网络(RNN)、长短期记忆(LSTM)和梯度递归单元(GRU)在内的深度学习模型,对最新数据集CICDDoS2019上的DDoS攻击进行检测,并与CICIDS2017数据集进行比较分析。该比较分析有助于开发一种高效且准确的方法来检测DDoS攻击,同时减少执行时间和复杂度。实验结果表明,这些模型在CICDDoS2019数据集上表现相当,准确率得分为0.99,但在执行时间上存在差异,GRU的执行时间比RNN和LSTM的执行时间短。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/f2dcfa1c233d/sensors-23-08642-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/37006496bbb2/sensors-23-08642-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/a9e89949399e/sensors-23-08642-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/06757e0e9a30/sensors-23-08642-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/8b235dc19b30/sensors-23-08642-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/6a620e351992/sensors-23-08642-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/74a285f738de/sensors-23-08642-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/fbc1bf3d0b76/sensors-23-08642-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/f4faf8e06acb/sensors-23-08642-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/1729889bf72d/sensors-23-08642-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/39c509851e17/sensors-23-08642-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/fb56d0037db3/sensors-23-08642-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/997322b73408/sensors-23-08642-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/0849bc8d8939/sensors-23-08642-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/349c2b19fc67/sensors-23-08642-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/f2dcfa1c233d/sensors-23-08642-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/37006496bbb2/sensors-23-08642-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/a9e89949399e/sensors-23-08642-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/06757e0e9a30/sensors-23-08642-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/8b235dc19b30/sensors-23-08642-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/6a620e351992/sensors-23-08642-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/74a285f738de/sensors-23-08642-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/fbc1bf3d0b76/sensors-23-08642-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/f4faf8e06acb/sensors-23-08642-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/1729889bf72d/sensors-23-08642-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/39c509851e17/sensors-23-08642-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/fb56d0037db3/sensors-23-08642-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/997322b73408/sensors-23-08642-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/0849bc8d8939/sensors-23-08642-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/349c2b19fc67/sensors-23-08642-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e838/10611275/f2dcfa1c233d/sensors-23-08642-g015.jpg

相似文献

1
Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm.基于深度学习算法的网络流量分布式拒绝服务攻击检测
Sensors (Basel). 2023 Oct 23;23(20):8642. doi: 10.3390/s23208642.
2
Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks.基于条件表格生成对抗的物联网网络 DDoS 和 DOS 攻击入侵检测系统。
Sensors (Basel). 2023 Jun 16;23(12):5644. doi: 10.3390/s23125644.
3
Network Anomaly Intrusion Detection Based on Deep Learning Approach.基于深度学习方法的网络异常入侵检测。
Sensors (Basel). 2023 Feb 15;23(4):2171. doi: 10.3390/s23042171.
4
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices.基于软件定义网络的一对多策略,用于检测和缓解智能家居物联网设备中的分布式拒绝服务攻击
Sensors (Basel). 2024 Aug 3;24(15):5022. doi: 10.3390/s24155022.
5
Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.基于自适应机器学习的支持软件定义网络的物联网分布式拒绝服务攻击检测与缓解系统
Sensors (Basel). 2022 Mar 31;22(7):2697. doi: 10.3390/s22072697.
6
Adaptive Anomaly Detection Framework Model Objects in Cyberspace.网络空间中的自适应异常检测框架模型对象
Appl Bionics Biomech. 2020 Dec 9;2020:6660489. doi: 10.1155/2020/6660489. eCollection 2020.
7
Ensemble Learning Framework for DDoS Detection in SDN-Based SCADA Systems.基于软件定义网络(SDN)的监控与数据采集(SCADA)系统中分布式拒绝服务(DDoS)检测的集成学习框架
Sensors (Basel). 2023 Dec 27;24(1):155. doi: 10.3390/s24010155.
8
Advanced machine learning approach for DoS attack resilience in internet of vehicles security.用于车辆互联网安全中抵御拒绝服务攻击的先进机器学习方法。
Heliyon. 2024 Mar 29;10(8):e28844. doi: 10.1016/j.heliyon.2024.e28844. eCollection 2024 Apr 30.
9
Novel Machine Learning Approach for DDoS Cloud Detection: Bayesian-Based CNN and Data Fusion Enhancements.用于分布式拒绝服务云检测的新型机器学习方法:基于贝叶斯的卷积神经网络和数据融合增强
Sensors (Basel). 2024 Feb 22;24(5):1418. doi: 10.3390/s24051418.
10
The proposed hybrid deep learning intrusion prediction IoT (HDLIP-IoT) framework.所提出的混合深度学习入侵预测物联网 (HDLIP-IoT) 框架。
PLoS One. 2022 Jul 29;17(7):e0271436. doi: 10.1371/journal.pone.0271436. eCollection 2022.

引用本文的文献

1
Enhancing Security in 5G Edge Networks: Predicting Real-Time Zero Trust Attacks Using Machine Learning in SDN Environments.增强5G边缘网络的安全性:在软件定义网络(SDN)环境中使用机器学习预测实时零信任攻击
Sensors (Basel). 2025 Mar 19;25(6):1905. doi: 10.3390/s25061905.
2
An intelligent federated learning boosted cyberattack detection system for Denial-Of-Wallet attack using advanced heuristic search with multimodal approaches.一种用于防范钱包拒绝服务攻击的智能联邦学习增强型网络攻击检测系统,该系统采用先进的启发式搜索和多模态方法。
Sci Rep. 2025 Apr 24;15(1):14265. doi: 10.1038/s41598-025-96986-5.
3
Distributed Denial of Services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP.

本文引用的文献

1
Deep learning approaches for detecting DDoS attacks: a systematic review.用于检测分布式拒绝服务攻击的深度学习方法:一项系统综述。
Soft comput. 2022 Jan 27:1-37. doi: 10.1007/s00500-021-06608-1.
使用配备优化器的卷积神经网络-多层感知器在软件定义网络中进行分布式拒绝服务(DDoS)攻击检测。
PLoS One. 2025 Jan 27;20(1):e0312425. doi: 10.1371/journal.pone.0312425. eCollection 2025.