2020
DOI: 10.1016/j.comnet.2020.107391
|View full text |Cite
|
Sign up to set email alerts
|

Detection of zero-day attacks: An unsupervised port-based approach

Abstract: Last years have witnessed more and more DDoS attacks towards high-profile websites, as the Mirai botnet attack on September 2016, or more recently the memcached attack on March 2018, this time with no botnet required. These two outbreaks were not detected nor mitigated during their spreading, but only at the time they happened. Such attacks are generally preceded by several stages, including infection of hosts or device fingerprinting; being able to capture this activity would allow their early detection. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(19 citation statements)
references
References 22 publications
(33 reference statements)
0
19
0
Order By: Relevance
“…Lobato, Lopez, et al [14] utilize supervised machine learning approaches such as Support Vector Machines (SVM) and Stochastic Gradient Descent (SGD) Algorithms to classify network flow telemetry as malicious or benign using an adaptive data modeling and pipeline approach with promising results, achieving precision and recall values between 65.7% and 97.3%. Blaise et al [15] utilized network flow telemetry to identify ZDTs using an unsupervised approach that identifies anomalous port usage. Sarhan et al [16] also utilized network flow telemetry to identify ZDTs using a Zero-Shot Learning approach with Random Forest (RF) and Multi-layer Perceptron (MLP) models using a novel data splitting approach to hold out attack classes as ZDTs to measure performance.…”
Section: Review Of the Literaturementioning
confidence: 99%
“…Lobato, Lopez, et al [14] utilize supervised machine learning approaches such as Support Vector Machines (SVM) and Stochastic Gradient Descent (SGD) Algorithms to classify network flow telemetry as malicious or benign using an adaptive data modeling and pipeline approach with promising results, achieving precision and recall values between 65.7% and 97.3%. Blaise et al [15] utilized network flow telemetry to identify ZDTs using an unsupervised approach that identifies anomalous port usage. Sarhan et al [16] also utilized network flow telemetry to identify ZDTs using a Zero-Shot Learning approach with Random Forest (RF) and Multi-layer Perceptron (MLP) models using a novel data splitting approach to hold out attack classes as ZDTs to measure performance.…”
Section: Review Of the Literaturementioning
confidence: 99%
“…Different attributes in the data set have different ranges. To reduce the impact of such difference on the detection model, we can use z-score standardization [25,26] on the data to make it a normal distribution. Using distance to measure similarity and the PCA to reduce dimensions, the z-score normalization is better than the Minmax normalization in classification and clustering algorithms.…”
Section: Numerization Of Character Datamentioning
confidence: 99%
“…Memcached is a database-caching system used to speed up websites’ dynamic databases by caching frequent data in DRAM. Memcached uses a key-value method to store data, and it solves the problem of having an extensive data cache [ 53 ].…”
Section: The Necessity Of Securing Memcached Architecturementioning
confidence: 99%
“…The Memcached mechanism was designed to work internally, but it became exposed to unauthenticated servers, enabling exploitation via DDoS attacks [ 53 ]. A case in which IoT botnets can be deployed is shown in Figure 5 , where vulnerable Memcached servers are used for launching attacks.…”
Section: The Necessity Of Securing Memcached Architecturementioning
confidence: 99%