Next Article in Journal
Performance Analysis on Low-Power Energy Harvesting Wireless Sensors Eco-Friendly Networks with a Novel Relay Selection Scheme
Previous Article in Journal
A High-Performance and Accurate FPGA-Based Flow Monitor for 100 Gbps Networks
Previous Article in Special Issue
Classification of Firewall Log Data Using Multiclass Machine Learning Models
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Detection of Adversarial DDoS Attacks Using Symmetric Defense Generative Adversarial Networks

1
Department of Electronic Engineering, National Kaohsiung University of Science and Technology, Kaohsiung 807, Taiwan
2
Department of Electronic and Automation Engineering, Nha Trang University, Nha Trang 650000, Vietnam
3
Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 804, Taiwan
4
Genie Networks Ltd., Taipei 114, Taiwan
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(13), 1977; https://doi.org/10.3390/electronics11131977
Submission received: 25 May 2022 / Revised: 20 June 2022 / Accepted: 21 June 2022 / Published: 24 June 2022
(This article belongs to the Special Issue Emerging Technologies for Security Applications)

Abstract

:
DDoS (distributed denial of service) attacks consist of a large number of compromised computer systems that launch joint attacks at a targeted victim, such as a server, website, or other network equipment, simultaneously. DDoS has become a widespread and severe threat to the integrity of computer networks. DDoS can lead to system paralysis, making it difficult to troubleshoot. As a critical component of the creation of an integrated defensive system, it is essential to detect DDoS attacks as early as possible. With the popularization of artificial intelligence, more and more researchers have applied machine learning (ML) and deep learning (DL) to the detection of DDoS attacks and have achieved satisfactory accomplishments. The complexity and sophistication of DDoS attacks have continuously increased and evolved since the first DDoS attack was reported in 1996. Regarding the headways in this problem, a new type of DDoS attack, named adversarial DDoS attack, is investigated in this study. The generating adversarial DDoS traffic is carried out using a symmetric generative adversarial network (GAN) architecture called CycleGAN to demonstrate the severe impact of adversarial DDoS attacks. Experiment results reveal that the synthesized attack can easily penetrate ML-based detection systems, including RF (random forest), KNN (k-nearest neighbor), SVM (support vector machine), and naïve Bayes. These alarming results intimate the urgent need for countermeasures against adversarial DDoS attacks. We present a novel DDoS detection framework that incorporates GAN with a symmetrically built generator and discriminator defense system (SDGAN) to deal with these problems. Both symmetric discriminators are intended to simultaneously identify adversarial DDoS traffic. As demonstrated by the experimental results, the suggested SDGAN can be an effective solution against adversarial DDoS attacks. We train SDGAN on adversarial DDoS data generated by CycleGAN and compare it to four previous machine learning-based detection systems. SDGAN outperformed the other machine learning models, with a TPR (true positive rate) of 87.2%, proving its protection ability. Additionally, a more comprehensive test was undertaken to evaluate SDGAN’s capacity to defend against unseen adversarial threats. SDGAN was evaluated using non-training data-generated adversarial traffic. SDGAN remained effective, with a TPR of around 70.9%, compared to RF’s 9.4%.

1. Introduction

A denial of service (DoS) attack is a type of cyberattack in which the attacker attempts to restrict or entirely disable access to the resources of a system or network, rendering services inaccessible to their legitimate users. Since the 1980s, the scientific community has been aware of the DoS attack. Gligor published one of the earliest descriptions of a denial-of-service attack on an operating system in 1983 [1]. DoS attacks are one of the most dangerous types of cyber security threats to server infrastructure. These attacks target a server, application, or service platform by flooding it with malicious traffic to exhaust its computational or network resources, resulting in malfunction and congestion.
Distributed denial of service (DDoS) attacks are on a much greater scale. DDoS attacks seize control of a network of compromised systems, referred to as a botnet, and conduct offensive operations against the victim system. There is a broad spectrum of victims, including government agencies, financial institutions, healthcare providers, and limited consumer networks [2].
DDoS attacks have proliferated in recent years, both in scale and in frequency. According to Link11’s report for the first half of 2021 [3], numerous attacks were recorded in this period. There was an increase of 33% in frequency compared to the first half of 2020, with 65% of attacks taking advantage of multi-vector attacks. The maximum value for attack bandwidth was up to 555 Gbps. For the time being, cloud services are well embraced by many companies serving as their primary computing and data storage facility. Cloud services have also received the attention of attackers. Up to 35% of attacks target data center operators and hosting service providers, with a wide variety of attack methods, such as carpet-bombing attacks and DDoS extortion.
DDoS attacks bring about a profound impact on an organization’s reputation and, therefore, its revenue. Before any mitigation measures can be taken, it is essential to detect DDoS attacks as soon as possible [4]. In the early era, the attack alarm was triggered by hand-coded rules. This strategic approach appears to have fallen behind the evolving nature of DDoS attacks. As AI (artificial intelligence) has demonstrated its potential in various fields, ML (machine learning) and DL (deep learning) have also been employed for the detection of DDoS attacks. They have achieved impressive success, as reviewed in [5].
The IDS (intrusion detection system) proposed by Das et al. [6] utilized numerous machine learning methods, including KNN, SVM, MLP (multilayer perceptron), and DT (decision tree). Dincalp [7] used the rate of various sorts of arriving packets as the central concept for identifying DDoS and employed the inefficient DBSCAN (density-based spatial clustering of applications with noise) algorithm for grouping the data. Comparing the performance of various categorization algorithms, Khuphiran et al. [8] provided a basis for selecting an approach to prevent a DDoS attack. Ramanauskaite et al. [9] provided a model for calculating the success likelihood of an attack on the basis of botnet size and agent allocation tactics. The model can be used to evaluate the probability of victim resistance in various assault and defense scenarios. Xiang and Li [10] created a model describing the interaction between the attacking and defending parties, which evaluates the efficacy of the defense system and estimates the appropriate security investment. Yong et al. [11] presented a framework for detection and mitigation. The shortcoming of the provided paradigm is that internal and external networks and hosts are not adequately separated. Previous models evaluated malicious agents and attack traffic behavior, giving a comprehensive analysis of attack dynamics and assessing the associated success criteria. Nevertheless, in addition to the advancement of defensive models, DDoS attacks have become increasingly harmful and complex to defend.
A new type of DDoS attack called an adversarial DDoS attack could pose new threats to ML/DL-based detection approaches. The GAN (generative adversarial network) [12] is well known for the generation of fake but real-looking data, such as image synthesis. We believe that the GAN is also capable of generating malicious but legitimate-like traffic to confuse DDoS detection systems. This study substantiates such a scientific hypothesis. We synthesize attacking traffic using a cycle generative adversarial network (CycleGAN) [13]. As shown in Section 4, the synthesized traffic can penetrate DDoS detection systems, including random forest, k-nearest neighbor, support vector machine, and naïve Bayes, undetected.
The flexibility and unpredictability of adversarial attacks are a vulnerability of traditional DDoS defense systems. While detection of adversarial DDoS attacks is still in its infancy, the AI community has made substantial attempts to confront these attacks. Kolosnjaji et al. [14] presented an evasive attack based on gradients. The authors attached a sequence of bytes to the end of the malicious code without interfering with its functionality, and then computed the gradient to generate adversarial samples. The limitation of this work is that the dataset used was not large enough to produce thorough results. Song et al. [15] described how to create and test genuine malware capable of carrying out the elusive attack. The adversarial attack was created using a custom action set and verification function. However, the defense mechanisms and robustness of the framework have received less attention. In the research direction emphasizing adversarial attacks, our study concentrates on building an adequate defense model against adversarial attacks.
This article makes contributions by proposing a novelty framework for detecting adversarial DDoS attacks, entitled the symmetric defense generative adversarial network (SDGAN). To address adversarial attack issues, the proposed SDGAN employs a symmetrically constructed generator and discriminator defense system. Both symmetric discriminators are designed to identify adversarial DDoS traffic simultaneously. To assess SDGAN’s effectiveness, it is trained using adversarial DDoS traffic generated by a CycleGAN generating system. SDGAN surpassed RF, KNN, SVM, and naïve Bayes with a TPR of 87.2%. Additionally, a more challenging test was performed to evaluate SDGAN’s capacity in dealing with unseen adversarial threats. SDGAN was assessed using adversarial traffic produced from different training datasets. SDGAN remained effective with a TPR of around 70.9%, compared to RF’s 9.4%.
The remainder of this article is structured as follows: Section 2 summarizes prior work and the GAN; Section 3 outlines the basis for the suggested strategy; in Section 4, the experimental results are reported; Section 5 concludes this study.

2. Related Work

2.1. Artificial Intelligence for DDoS Detection

Various ML technologies have been employed in the detection of DDoS attacks, primarily as classifiers. These are support vector machine (SVM) [16], k-nearest neighbor (KNN) [17], naïve Bayes classifier [18], random forest (RF) [19], and density-based spatial clustering of applications with noise (DBSCAN) [7], to name a few. Providing further information, Gavrilis proposed the RBF-NN detector [20], which utilizes nine packet parameters and associated parameters generated using these frequencies. It is predicted that, depending on the frequency, RBF-NN traffic will be classified as normal, until it is classified as an attack. Alternatively, as Ibrahim stated, the distributed time delay neural network (DTDNN) [21] has a high probability of detecting attacks with increased precision.
Numerous investigations on decision tree analytical advancements were conducted in order to identify the DDoS attack. Pandya and Pandya employed C4.5, C5.0, and ID3 algorithms in [22] to create a more robust decision tree with improved performance. According to the findings obtained, C5.0 performed better in terms of accuracy and memory use. Shoo et al. [23] proposed a novel evolutionary model for classifying DDoS attack traffic that uses a combined SVM algorithm to classify malicious traffic. Genetic algorithms (GA) were applied for SVM optimization as a feature selection method to improve the model’s classification performance. Tan et al. [24] proposed an alternative framework for DDoS attack security. The model consisted of two modules utilizing machine learning algorithms. The k-means algorithm was applied in the data processing module to select the best features. The k-nearest neighbor (KNN) algorithm was employed in the detection module to distinguish attack flows.

2.2. Generative Adversarial Networks

The GAN, proposed by Goodfellow et al. [12] in 2014, has shown a wide range of applications in recent years. As shown in Figure 1, a GAN is formed by two functional blocks: a generator and a discriminator. These two blocks act as parties in game theory and contend with each other. The generator aims to generate artificial data to fool the discriminator. Conversely, the discriminator is responsible for judging the authenticity. As a GAN converges after a long training period, the generator should be able to produce artificial data indistinguishable from the real one. Equation (1) can be used to express the GAN’s loss function.
m i n G   m a x D V D , G = E p d a t a x l o g D x + E p z z l o g ( 1 D G z ,
where x denotes the data, z is the input noise to the generator, p d a t a is the data distribution, p z is the noise distribution, G is the generator, and D is the discriminator.
Despite its widespread popularity, GAN training and convergence continue to pose difficulties for trainers. The original GAN is subject to converging problems, such as loss functions that do not provide training direction and data that lack variation. The Wasserstein GAN (WGAN) [25] presents the Wasserstein distance as a way to circumvent the gradient vanishing problem inherent in original GANs. The WGAN was found to be more stable during the training process, with fewer examples collapsing.
While WGAN improves upon the original GAN, it still suffers from data quality and divergence concerns. These challenges are a result of the weight clipping method used by various WGANs. Weight clipping must be used to enforce the Lipschitz restriction. Even as consequence, it is possible that the WGAN weights will converge to critical values, reducing the model’s generation efficiency or possibly causing it to collapse. To overcome this issue, gradient penalty WGAN (GP-WGAN) suggested the gradient penalty technique [26]. After employing the gradient penalty technique, GP-WGAN learns a uniformly distributed gradient. Gradient penalty enhances the stability of WGAN training and generates higher-quality data.

2.3. Adversarial DDoS Attacks

According to hackers and academicians, GAN has the potential to introduce a new sort of DDoS attack: adversarial DDoS attack. In other words, GANs can be used to generate malicious traffic that seems to be legal. At CYBERSEC-2019, Trend Micro Inc. disclosed adversarial DDoS attacks. Adversarial machine learning (AML) is a technique used by hackers to identify flaws in machine learning-based detection systems and to mislead them with adversarial traffic. Numerous studies on the consequences of adversarial DDoS attacks have been executed. The least square GAN (LSGAN) was suggested in [27] for the purpose of artificially generating traffic on the basis of the fact that DDoS attacks closely resemble typical flash crowds. Up to 99% of LSGAN-generated DDoS traffic was incorrectly labeled as legitimate flash crowds. Hu et al. introduce MalGAN, an intriguing architecture for adversarial DDoS attacks, including a black-box detector and two neural networks [28]. As a victim system, the black-box detector was used. The black-box detector was used to distinguish the instances of the generator. The discriminator was then fed the classifying results. Whenever the discriminator was unable to discern the difference between adversarial and benign attacks, the system converged.
While detection of adversarial DDoS attacks is still in its infancy, the AI community has made substantial attempts to confront these attacks. Kolosnjaji et al. [14] presented an evasive attack based on gradients. The authors attached a sequence of bytes to the end of the malicious code without interfering with its functionality, and then computed the gradient to generate adversarial samples. The limitation of this work is that the dataset used was not large enough to produce thorough results. Song et al. [15] described how to create and test genuine malware capable of carrying out the elusive attack. The adversarial attack was created using a custom action set and verification function. However, the defense mechanisms and robustness of the framework have received less attention. Ebrahimi et al. [29] advocated the use of MalRNN to produce adversarial malware variants automatically. MalRNN is a revolutionary deep learning model that obtains data via system sampling and uses RNN to learn the language model of benign malware binaries. The study is limited by the simplicity of its strategy for bypassing antivirus.

2.4. CycleGAN

CycleGAN, or cycle-consistent generative adversarial network, is one kind of GAN originally designed for unpaired image-to-image translation [13]. Unsupervised training is used to develop the models, utilizing a variety of unrelated data from the source and target domains. This simple approach is very effective, producing aesthetically stunning outcomes across a variety of application areas. A notable application is the conversion of photos of horses and zebra. CycleGAN is a variant of standard GAN that allows for the concurrent training of two generator models, G A and G B , and two discriminator models, D A and D B . CycleGAN learns a mapping G A : Φ B Φ A and G B : Φ A Φ B between two different domains, Φ A and Φ B . A distinctive feature of CycleGAN is inspired by the intuition that these translations should be inverses of one another, and both mappings should be bijective. This unique feature can be achieved by a cycle consistency loss that favors both G A and G B . Combining this loss with the adversarial losses for Φ A and Φ B , we can then reach the objective of translating unpaired data to data.
This article explores the potential of CycleGAN in the synthesis of adversarial DDoS attacks. We partition the NSL-KDD dataset into two unpaired sub-datasets: the attack dataset and the benign dataset. We employ an architecture consisting of two GANs, each with its own discriminator and generator model. The first GAN generates attack data from the benign input, whereas the second GAN generates benign data from the attack data. In addition, each GAN includes a discriminator to judge the authenticity of input data. As the models converge, they can generate data that closely resemble those from the target domains.

3. Proposed Approach

3.1. Proposed Approach

As illustrated in Figure 2, the CycleGAN model has the advantage of being trained without using paired examples. No instances of data before and after translation are required. Instead, the model can extricate and leverage the underlying style of the data from each domain to perform the translation. The proposed model comprises two generators; the first generator, G A , is used to generate data for the “attack domain”, Φ A , while the second generator, G B , is used to generate data for the “benign domain”, Φ B .
The generators perform data translation depending on input data, i.e., data from the other domain. Data from Φ B are fed into G A , whereas G B takes data from Φ A   as input. G A tries to generate adversarial data that look similar to traffic from Φ A as much as possible and vice versa. Each generator contends with a discriminator. The first discriminator, D A , pulls real attack data and adversarial data from G A to deliver a real or fake decision. The second discriminator, D B , also performs the same function with authentic benign traffic and adversarial traffic from G B .
As with conventional GAN models, the discriminator and generator of CycleGANs are trained according to the adversarial zero-sum concept. The generators aim to improve their ability to mislead the discriminators, while the discriminators try to identify artificial fake data with the same effort. The training process strives to achieve an equilibrium. Furthermore, the generators are regularized to synthesize reconstructed data from the source domain, not just create adversarial data in the destination domain. This is accomplished by feeding the produced data into the adequate generator and correlating the results to the original data. A cycle is defined as the passage of data across both generators. Each pair of generators is trained in tandem to improve the reproduction of the source data, a process referred to as cycle consistency, as shown in Figure 3.
Additionally, as illustrated in Figure 4, the architecture includes identity mappings. Input data from the target domain are anticipated to provide resemble results. This design is optional but improves input data matching.

3.2. Loss Functions

  • Adversarial Loss
Both mapping functions are closely related to adversarial losses. We express the loss function for the mapping function G A :   Φ B Φ A and its discriminator D A as follows:
L a d v G A , D A = E A Φ A l o g D A A + E B Φ B l o g 1 D A G A B ,
where A is the attack traffic in the attack training set Φ A , and B is the benign traffic in the benign training set Φ B .
  • Cycle Consistency Loss
The data translation cycle should be able to restore B to its original instance for each benign data from Φ B , i.e.,
B Φ B ,   B G A B G B G A B B .
Similarly, G A and G B should also meet the following requirement for each A from Φ A :
A Φ A ,   A G B A G A G B A A /
We use a cycle consistency loss to enforce the abovementioned characteristic.
L c y c G A , G B = E A Φ A | G A G B A A | 1 + E B Φ B | G B G A B B | 1 ,
where A is the attack traffic in the attack training set Φ A , and B is the benign traffic in benign the training set Φ B .
  • Identity Loss
Identity mapping is a feature of the adopted architecture. It is expected that input data from the target domain would provide similar outcomes, i.e.,   G A A A and G B B B . We employ an identity loss to support this.
L i d e G A , G B = E A Φ A | G A A A | 1 + E B Φ B | G B B B | 1 ,
where A is the attack traffic in the attack training set Φ A , and B is the benign traffic in benign the training set Φ B .
  • Generator Loss Function
The generator attempts to generate data that resemble the source data. The discriminator attempts to discern between translated and original samples. The generator aims to minimize the loss function, while the discriminator tries to maximize it. As a result, the following is the expression for the generator loss function of the proposed framework:
m i n G A , G B L G A , G B , D A , D B = L a d v G A , D A + L a d v G B , D B + λ · L c y c G A , G B + μ · L i d e G A , G B ,  
where λ and µ are parameters controlling the relative weightings of the cycle consistency loss and the identity loss, respectively.
The discriminator’s intention is to replicate the machine learning-based detection. It provides input to the generator for prompting adversarial traffic to be generated. The generated traffic should be undetected by the target machine learning-based detector. Algorithm 1 illustrates the operation of the CycleGAN architecture generating system.
Algorithm 1. Training of the CycleGAN architecture generating system
Input:
G A :   attack   domain   generator ,   D A :   attack   domain   discriminator ,   G B :   benign   domain   generator ,   G B :   benign   domain   discriminator ,   Φ A :   attack   domain ,   Φ B : benign domain
Output:
Trained CycleGAN architecture system
  •    for n_epochs do
  •         Attack   sample   batch   A i i = 1 m Φ A
  •         Benign   sample   batch   B i i = 1 m Φ B
  •         Generate   m   sample   of   G B A A ^   and   G A B B ^
  •         Generate   m   sample   of   G B ( G B A )   and   G B ( G A B )
  •         Generate   m   sample   of   G A A   and   G B B
  •         Update   the   discriminator   D A   and   D B according to the adversarial loss function using Equation (2)
  •         m a x D A L a d v G A , D A
  •         m a x D B L a d v G B , D B
  •         Update   the   Generator   G A   and   G B according to the total CycleGAN loss function using Equation (7)
  •         m i n G A , G B L G A , G B , D A , D B
  •    end for

3.3. Adversarial DDoS Attack Detection Using Symmetric Defense GAN (SDGAN)

The proposed SDGAN is a GAN with a symmetrically designed generator and discriminator system that can provide a solution to detect adversarial DDoS attacks, as illustrated in Figure 5, where G A   and   D A represent the generator and discriminator trained on the attacking domain, and G B and   D B represent the generator and discriminator trained on the benign domain, respectively. The traffic generated by the CycleGAN system is included in the training set of the SDGAN. Throughout conventional DDoS traffic discrimination, D A tends to distinguish attack traffic, while the D B aims to differentiate benign traffic from attack traffic. Simultaneously, both discriminators scrutinize the adversarial attack data in parallel.
In a conventional GAN, the generator generates new instances by using samples from the target domain. To guarantee the identification of adversarial DDoS traffic, the SDGAN generator is fed both standard DDoS traffic and adversarial samples created using the CycleGAN generating architecture. The following defines the generator’s loss function:
L G A = E B , N , E { D A [ D B G A B , E , N } ,
L G B = E A , N , E { D B [ D A G B A , E , N } ,  
where A repsents conventional attack traffic, B represents conventional benign traffic, N is the generator’s noise input, and E represents adversarial attacks.
In a similar manner, the training for the two discriminators D A and D B is carried out. We train the discriminator using the generators’ adversarial DDoS traffic. Accordingly, we obtain the correct gradient when confronted with the generator. The CycleGAN generating system’s adversarial attack data are used to improve the discriminator’s capability of detecting the adversarial attack. Conventional traffic is also considered when training the discriminator aims to prepare it with the ability to distinguish legitimate from attack traffic. The following is the definition of the discriminator’s loss function:
m a x D A   L a d v G A , D A = E A l o g D A A + E B , E l o g 1 D A E , B , D B G A B , E , N ,
m a x D B   L a d v G B , D B = E B l o g D B B + E A , E l o g 1 D B E , A , D A G B A , E , N ,
where A represents conventional attack traffic, B represents conventional benign traffic, N is the generator’s noise input, and E represents adversarial attacks.
Algorithm 2 presents the operation of the SDGAN.
Algorithm 2. Algorithm for SDGAN
Input:
G A :   attack   domain   generator ,   D A :   attack   domain   discriminator ,   G B :   benign   domain   generator ,   D B : benign domain discriminator, N: noise, B: benign traffic, A: normal DDoS attack, E: adversarial attack generated by CycleGAN
Output:
Trained SDGAN
  •    for n_epochs do
  •        Generate   sample   of   G A B , E , N   and   G B A , E , N
  •       //Training of G
  •        L G A E A , N , E { D A [ D B G A B , E , N ] }
  •        L G B E A , N , E { D B [ D A G B A , E , N ) }
  •        Update   G A   and   G B according to the gradient of G’s loss function
  •       //Training of D
  •     Let:
  •      S A D B G A B , E , N
  •      S B D A G B A , E , N
  •      m a x D A   L a d v G A , D A = E A l o g D A A + E B , E l o g 1 D A E , B , S A
  •      m a x D B   L a d v G B , D B = E B l o g D B B + E A , E l o g 1 D B E , A , S B
  •      Update   D A   and   D B according to the gradient of D’s loss function
  •    end for

4. Experimental Results and Discussion

Various experiments were conducted to determine the feasibility and effectiveness of the proposed approaches. In the experiments, each of the statements below was looked at in turn to determine their validity.
  • ML-based and SDGAN are highly effective in DDoS detection.
  • Adversarial DDoS attacks from the CycleGAN generation system have the ability to bypass ML-based DDoS detection systems.
  • The proposed SDGAN system is effective in identifying adversarial DDoS attacks.
The experiments were carried out using a Windows 10 personal computer equipped with an Intel i7-8700 processor, 32GB of RAM, and an NVIDIA RTX 2060 graphics card. The CycleGAN architecture generating system for the synthesis of adversarial DDoS attacks and SDGAN for detecting adversarial DDoS detection were implemented with PyTorch.
This study operated with two widely used datasets, NSL-KDD [30] and CIC-IDS2018 [31]. These datasets made available by the Canadian Institute for Cybersecurity for the purpose of doing research on intrusion detection. The NSL-KDD dataset is an approach developed from the KDD’99 [32] dataset that contains no redundant or duplicate data. The CIC-IDS2018 dataset contains benign and up-to-date common attacks, as well as the results of network traffic analysis performed using CICFlowMeter [33], which includes labeled flows based on the time stamp, source and destination IP addresses, source and destination ports, protocols, and attack type (CSV files). We concentrated on DDoS traffic and utilized these datasets to build machine learning models for DDoS detection and synthesis of adversarial DDoS attacks.
For comparative purposes, various performance indices were used. True positive rate (TPR) and false positive Rate (FPR) are defined in Equations (12) and (13), respectively, with reference to Table 1. The receiver operating characteristic (ROC) curve could be used to assess the impact of adversarial DDoS attacks and the proposed SDGAN’s effectiveness in detecting DDoS attacks.
T P R = T P T P + F N .
F P R = F P F P + T N .

4.1. ML-Based and SDGAN Detection of Conventional DDoS

To mitigate the possibility of adversarial DDoS attacks, we established SDGAN, which was described in Section 3. As discussed in Section 3, SDGAN’s two discriminators are designed to work in unison and symmetrically to detect both adversarial attacks and conventional DDoS traffic. The proposed SDGAN’s network configuration and training parameter settings are listed in Table 2 and Table 3.
The disorientation of the training direction caused by the gradient vanishing phenomenon is a basic issue in training GANs. The SDGAN model described in this article enables the PReLU activation function to allow the model to modify the direction of the gradient by itself, thereby avoiding information loss. Additionally, it includes dropout layers to handle the overfitting problem. Additionally, the proposed SDGAN’s optimization function integrates the gradient penalty as a constraint to improve the stability of the entire training process. The experimental findings imply that the offered model configurations helped to decrease the gradient distraction, thereby stabilizing the training process.
Many studies have reported that machine learning was successfully used for DDoS detection. This part of the report examines the detection of DdoS attacks using four ML-based defense systems (RF, KNN, SVM, and NB) to compare with SDGAN on the NSL-KDD and CIC-IDS2018 datasets. Prior to training, data were classified as legitimate or malicious; 80% of the sample was utilized for training, while 20% was used for validation. Table 4 and Table 5 present the outcomes of applying RF, KNN, SVM, and NB to the NSL-KDD and CIC-IDS2018 datasets, respectively. Higher TPR scores indicate increased detectability. As shown, all four machine learning-based DDoS detection techniques can be regarded as effective. This observation corroborates prior research. Additionally, on the basis of the results of these two data tables, it is clear that SDGAN outperformed ML-based defense systems in terms of DDoS detection capability, with a TPR index of approximately 0.97 compared to an RF peak of approximately 0.92.
Along with the TPR, the ROC curve is an effective performance statistic for evaluating detection and classification accuracy. A greater area under the curve (AUC) signifies a higher detection accuracy for an ROC curve. Figure 6a,b show that SDGAN had the best detection rate, compared to RF, followed by the other three machine learning defense systems.

4.2. Detection of Adversarial DDoS Attacks with SDGAN

We established SDGAN to mitigate the possibility of adversarial DDoS attacks. SDGAN’s two discriminators are designed to work symmetrically and in tandem to detect both adversarial attacks and conventional DDoS traffic. The adversarial DDoS attacks generated by the CycleGAN can also be used to validate the proposed SDGAN’s ability to detect adversarial DDoS attacks.

4.2.1. Adversarial DDoS Attack Synthesis Employing CycleGAN

GAN is well known for its ability to generate realistic-looking false images. We anticipated that GAN could also be used to produce malicious traffic that appears to be legal, i.e., adversarial DDoS attacks. We used the CycleGAN architecture described in Section 3 with the network design and training settings specified in Table 6 and Table 7. The gradient penalty was used to maintain the training process’s stability. The neural network activation function used Leaky ReLU rather than sigmoid to increase the resilience of the training process and to avoid the vanishing gradient phenomenon.
After training, the CycleGAN architecture system’s adversarial DDoS attacks were used to target machine learning-based DDoS detectors and SDGAN to evaluate their capabilities of detecting adversarial DDoS attacks; we experimented with four ML-based defense systems and SDGAN, on adversarial DDoS attacks trained using NSL-KDD and CIC-IDS2018.

4.2.2. Detection of Adversarial DDoS Attacks with SDGAN

As shown in Table 8, the TPRs of the four ML-based DDoS defense systems dropped dramatically below 0.2. This means that adversarial DDoS attacks could slip undetected via machine learning-based DDoS detectors. The ROC curves in Figure 7 further demonstrate the failure of machine learning-based DDoS detectors to detect adversarial DDoS attacks. We can conclude that adversarial DDoS attacks constitute a significant vulnerability for conventional machine learning-based DDoS detectors. Additionally, the CycleGAN generating system used in this study was highly effective for synthesizing adversarial DDoS attacks. On the other hand, the suggested SDGAN retained a high TPR of 0.857 and 0.872 on the NSL-KDD and CIC-IDS2018 datasets, respectively. This demonstrates that the proposed SDGAN is a viable option for combating adversarial DDoS attacks.
In comparison to SDGAN, Figure 7 illustrates the ROC curves for ML-based DDoS detection techniques on adversarial DDoS attacks. The higher AUC value and steepness of SDGAN’s ROC curve indicate its superiority over the four machine learning-based defense systems.
The next experiment considered a more difficult and realistic scenario. The SDGAN was trained using adversarial DDoS traffic generated by CIC-IDS2018 and evaluated using adversarial DDoS traffic generated by NSL-KDD. This experiment arrangement was used to evaluate the SDGAN’s capacity to deal with previously unseen adversarial DDoS attacks. Table 9 and Figure 8 summarize the findings. The performance of machine learning-based techniques deteriorated further. Even the best possible outcome, RF, had a TPR of 0.094. The TPR of SDGAN declined, while the steepness and AUC of the ROC curve likewise decreased. SDGAN continued to have a TPR of 0.709. This conclusion is indicative of the enigmatic nature of unseen adversarial DDoS attacks. SDGAN, on the other hand, was still deemed to be effective in comparison to the other techniques.
Therefore, in the more difficult and realistic case of cordoning off unseen adversarial attacks, SDGAN was still effective, with a TPR of approximately 70.9%, compared to 9.4% for RF. Figure 8 reveals the same conclusion. With an AUC of 0.734, SDGAN’s ROC curve was steep, indicating that its sensitivity improved more quickly than its specificity. On the other hand, because of the low TPR rates, the ROC curves of the other machine learning-based algorithms were typically closer to the diagonal, signifying a lower sensitivity and a higher specificity.

5. Conclusions

This study examined the possible threat posed by a novel type of DDoS attack called adversarial DDoS. The CycleGAN-based architecture is capable of generating legal malicious traffic. The experiment findings indicated that synthetic adversarial DDoS attacks could easily penetrate machine learning-based detection systems such as RF, KNN, SVM, and NB. This occurrence serves as a drastic warning that adversarial DDoS attacks necessitate immediate retaliation. This research proposed the SDGAN architecture as a reaction to this emerging threat. The experimental results showed that adversarial DDoS attacks could be effectively avoided by using SDGAN’s two symmetric discriminators protection paradigm. SDGAN could achieve TPRs of 0.977, 0.872, and 0.709 in terms of conventional DDoS attacks, adversarial DDoS attacks, and unseen adversarial DDoS attacks, respectively. The suggested SDGAN can be deemed adequate, whereas it could be improved against unseen adversarial DDoS. Integrating open set identification technology may be a worthwhile avenue to pursue.

Author Contributions

Conceptualization, C.-S.S.; methodology, T.-T.N.; software, T.-T.N.; validation, W.-W.L.; writing—original draft preparation, T.-T.N.; writing—review and editing, C.-S.S. and W.K.L.; visualization, T.-T.N. and W.-W.L.; supervision, C.-S.S.; project administration, C.-S.S. and M.-F.H.; funding acquisition, D.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Ministry of Science and Technology, Taiwan grant numbers MOST 110-2221-E-992-012, MOST 109-2221-E-110-049-MY2 and MOST 109-2221-E-992-073-MY3.

Data Availability Statement

Data supporting the reported results are available upon request.

Acknowledgments

This research was partly supported by the Ministry of Science and Technology, Taiwan under the grant numbers MOST 110-2221-E-992-012, MOST 109-2221-E-110-049-MY2 and MOST 109-2221-E-992-073-MY3.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gligor, V.D. A Note on Denial-of-Service in Operating Systems. IEEE Trans. Softw. Eng. 1984, 3, 320–324. [Google Scholar] [CrossRef]
  2. Mirchev, M.J.; Mirtchev, S.T. System for DDoS attack mitigation by discovering the attack vectors through statistical traffic analysis. Int. J. Inf. Comput. Secur. 2020, 13, 309–321. [Google Scholar] [CrossRef]
  3. DDoS Report 1st Half-Year 2021. Cyber Resilience Made in Germany—Link11. Available online: https://www.link11.com/en/downloads/ddos-report-1st-half-2021/ (accessed on 24 May 2022).
  4. Bakr, A.; El-Aziz, A.A.A.; Hefny, H.A. A Survey on Mitigation Techniques against DDoS Attacks on Cloud Computing Architecture. Int. J. Adv. Sci. Technol. 2019, 28, 12. [Google Scholar]
  5. Priya, S.S.; Sivaram, M.; Yuvaraj, D.; Jayanthiladevi, A. Machine Learning based DDOS Detection. In Proceedings of the 2020 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, 12–14 March 2020; pp. 234–237. [Google Scholar] [CrossRef]
  6. Das, S.; Mahfouz, A.M.; Venugopal, D.; Shiva, S. DDoS Intrusion Detection Through Machine Learning Ensemble. In Proceedings of the 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), Sofia, Bulgaria, 22–26 July 2019; pp. 471–477. [Google Scholar] [CrossRef]
  7. Dincalp, U.; Guzel, M.S.; Sevine, O.; Bostanci, E.; Askerzade, I. Anomaly Based Distributed Denial of Service Attack Detection and Prevention with Machine Learning. In Proceedings of the 2018 2nd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkey, 19–21 October 2018; pp. 1–4. [Google Scholar] [CrossRef]
  8. Khuphiran, P.; Leelaprute, P.; Uthayopas, P.; Ichikawa, K.; Watanakeesuntorn, W. Performance Comparison of Machine Learning Models for DDoS Attacks Detection. In Proceedings of the 2018 22nd International Computer Science and Engineering Conference (ICSEC), Chiang Mai, Thailand, 21–24 November 2018; pp. 1–4. [Google Scholar] [CrossRef]
  9. Ramanauskaitė, S.; Goranin, N.; Čenys, A.; Juknius, J. Modelling influence of Botnet features on effectiveness of DDoS attacks. Secur. Commun. Netw. 2015, 8, 2090–2101. [Google Scholar] [CrossRef]
  10. Yang, X.; Li, Z.; Zhou, W. An Analytical Model for DDoS Attacks and Defense. In Proceedings of the 2006 International Multi-Conference on Computing in the Global Information Technology—(ICCGI’06), Bucharest, Romania, 1–3 August 2006; p. 66. [Google Scholar] [CrossRef]
  11. Yong, W.; Tefera, S.H.; Beshah, Y.K. Understanding Botnet: From Mathematical Modelling to Integrated Detection and Mitigation Framework. In Proceedings of the 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Kyoto, Japan, 8–10 August 2012; pp. 63–70. [Google Scholar] [CrossRef]
  12. Goodfellow, I.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; Warde-Farley, D.; Ozair, S.; Courville, A.; Bengio, Y. Generative Adversarial Nets. Adv. Neural Inf. Process. Syst. 2014, 27. Available online: https://papers.nips.cc/paper/2014/hash/5ca3e9b122f61f8f06494c97b1afccf3-Abstract.html (accessed on 24 May 2022).
  13. Zhu, J.-Y.; Park, T.; Isola, P.; Efros, A.A. Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks. In Proceedings of the 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy, 22–29 October 2017; pp. 2242–2251. [Google Scholar] [CrossRef] [Green Version]
  14. Kolosnjaji, B.; Demontis, A.; Biggio, B.; Maiorca, D.; Giacinto, G.; Eckert, C.; Roli, F. Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. In Proceedings of the 2018 26th European Signal Processing Conference (EUSIPCO), Rome, Italy, 3–7 September 2018; pp. 533–537. [Google Scholar] [CrossRef] [Green Version]
  15. Song, W.; Li, X.; Afroz, S.; Garg, D.; Kuznetsov, D.; Yin, H. MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers. arXiv 2021, arXiv:2003.03100. Available online: http://arxiv.org/abs/2003.03100 (accessed on 24 May 2022).
  16. Cheng, J.; Yin, J.; Liu, Y.; Cai, Z.; Wu, C. DDoS Attack Detection Using IP Address Feature Interaction. In Proceedings of the 2009 International Conference on Intelligent Networking and Collaborative Systems, Barcelona, Spain, 4–6 November 2009; pp. 113–118. [Google Scholar] [CrossRef]
  17. Vu, N.H.; Choi, Y.; Choi, M. DDoS attack detection using K-Nearest Neighbor classifier method. In Proceedings of the IASTED International Conference on Telehealth/Assistive Technologies, Baltimore, MD, USA, 16–18 April 2008; pp. 248–253. [Google Scholar]
  18. Fadlil, A.; Riadi, I.; Aji, S. Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics. Bull. EEI 2017, 6, 140–148. [Google Scholar] [CrossRef]
  19. Wang, C.; Zheng, J.; Li, X. Research on DDoS Attacks Detection Based on RDF-SVM. In Proceedings of the 2017 10th International Conference on Intelligent Computation Technology and Automation (ICICTA), Changsha, China, 9–10 October 2017; pp. 161–165. [Google Scholar] [CrossRef]
  20. Gavrilis, D.; Dermatas, E. Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features. Comput. Netw. 2005, 48, 235–245. [Google Scholar] [CrossRef]
  21. Ibrahim, L.M. Anomaly Network Intrusion Detection System Based on Distributed Time-Delay Neural Network (DTDNN). J. Eng. Sci. Technol. 2010, 5, 457–471. [Google Scholar]
  22. Pandya, R.; Pandya, J. C5. 0 Algorithm to Improved Decision Tree with Feature Selection and Reduced Error Pruning. Int. J. Comput. Appl. 2015, 117, 18–21. [Google Scholar] [CrossRef]
  23. Sahoo, K.S.; Tripathy, B.K.; Naik, K.; Ramasubbareddy, S.; Balusamy, B.; Khari, M.; Burgos, D. An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks. IEEE Access 2020, 8, 132502–132513. [Google Scholar] [CrossRef]
  24. Tan, L.; Pan, Y.; Wu, J.; Zhou, J.; Jiang, H.; Deng, Y. A New Framework for DDoS Attack Detection and Defense in SDN Environment. IEEE Access 2020, 8, 161908–161919. [Google Scholar] [CrossRef]
  25. Arjovsky, M.; Chintala, S.; Bottou, L. Wasserstein generative adversarial networks. In Proceedings of the 34th International Conference on Machine Learning, Sydney, NSW, Australia, 6–11 August 2017; Volume 70, pp. 214–223. [Google Scholar]
  26. Gulrajani, I.; Ahmed, F.; Arjovsky, M.; Dumoulin, V.; Courville, A.C. Improved Training of Wasserstein GANs. Adv. Neural Inf. Process. Syst. 2017, 30. Available online: https://papers.nips.cc/paper/2017/hash/892c3b1c6dccd52936e27cbd0ff683d6-Abstract.html (accessed on 24 May 2022).
  27. Sun, D.; Yang, K.; Shi, Z.; Chen, C. A New Mimicking Attack by LSGAN. In Proceedings of the 2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI), Boston, MA, USA, 6–8 October 2017; pp. 441–447. [Google Scholar] [CrossRef]
  28. Hu, W.; Tan, Y. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. arXiv 2017, arXiv:1702.05983. Available online: http://arxiv.org/abs/1702.05983 (accessed on 24 May 2022).
  29. Ebrahimi, M.; Zhang, N.; Hu, J.; Raza, M.T.; Chen, H. Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model. arXiv 2020, arXiv:2012.07994. [Google Scholar]
  30. NSL-KDD|Datasets|Research|Canadian Institute for Cybersecurity|UNB. Available online: https://www.unb.ca/cic/datasets/nsl.html (accessed on 24 May 2022).
  31. IDS 2018|Datasets|Research|Canadian Institute for Cybersecurity|UNB. Available online: https://www.unb.ca/cic/datasets/ids-2018.html (accessed on 24 May 2022).
  32. KDD Cup 1999 Data. Available online: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed on 24 May 2022).
  33. C. I. for Cybersecurity, Canadian Institute for Cybersecurity/CIC Flow Meter. 2022. Available online: https://github.com/CanadianInstituteForCybersecurity/CICFlowMeter (accessed on 24 May 2022).
Figure 1. Generative adversarial network’s functional block diagram.
Figure 1. Generative adversarial network’s functional block diagram.
Electronics 11 01977 g001
Figure 2. CycleGAN diagram [13].
Figure 2. CycleGAN diagram [13].
Electronics 11 01977 g002
Figure 3. Cycle consistency mapping [13].
Figure 3. Cycle consistency mapping [13].
Electronics 11 01977 g003
Figure 4. Identity mapping.
Figure 4. Identity mapping.
Electronics 11 01977 g004
Figure 5. The architecture of SDGAN.
Figure 5. The architecture of SDGAN.
Electronics 11 01977 g005
Figure 6. ROC curves of ML-based defense DDoS detection and SDGAN on conventional DDoS attack: (a) NSL-KDD; (b) CIC-IDS2018.
Figure 6. ROC curves of ML-based defense DDoS detection and SDGAN on conventional DDoS attack: (a) NSL-KDD; (b) CIC-IDS2018.
Electronics 11 01977 g006
Figure 7. ROC curves of ML-based defense DDoS detection and SDGAN on adversarial DDoS attacks: (a) NSL-KDD; (b) CIC-IDS2018.
Figure 7. ROC curves of ML-based defense DDoS detection and SDGAN on adversarial DDoS attacks: (a) NSL-KDD; (b) CIC-IDS2018.
Electronics 11 01977 g007
Figure 8. ROC curves of ML-based defense DDoS detection and SDGAN on unseen adversarial DDoS attacks.
Figure 8. ROC curves of ML-based defense DDoS detection and SDGAN on unseen adversarial DDoS attacks.
Electronics 11 01977 g008
Table 1. Confusion matrix.
Table 1. Confusion matrix.
ActualAttackNormal
Predicted
AttackTP (true positive)FP (false positive)
NormalFN (false negative)TN (true negative)
Table 2. Configuration of D A and D B of SDGAN.
Table 2. Configuration of D A and D B of SDGAN.
LayerConfiguration
Input(None, 40)
Dense(None, 20)
PReLU(None, 20)
Dense(None, 10)
PReLU(None, 10)
Dense(None, 10)
Dropout(None, 10)
Dense(None, 2)
PReLU(None, 2)
Table 3. Training parameter settings of SDGAN generating system.
Table 3. Training parameter settings of SDGAN generating system.
Epoch/Batch SizeLearning RateOptimizerLambdaMu
500/600.000135Adam100.1
Table 4. ML-based defense DDoS detection and SDGAN on conventional NSL-KDD.
Table 4. ML-based defense DDoS detection and SDGAN on conventional NSL-KDD.
ModelTPRFPR
RF0.9110.048
KNN0.9020.059
SVM0.8640.124
Naïve Bayes0.8440.188
SDGAN0.9730.032
Table 5. ML-based defense DDoS detection and SDGAN on conventional CIC-IDS2018.
Table 5. ML-based defense DDoS detection and SDGAN on conventional CIC-IDS2018.
ModelTPRFPR
RF0.9250.074
KNN0.9220.075
SVM0.910.075
Naïve Bayes0.8060.063
SDGAN0.9770.029
Table 6. Network configuration of CycleGAN generating system.
Table 6. Network configuration of CycleGAN generating system.
LayerConfiguration
Input (conventional DDoS)(None, 40)
Dense(None, 20)
Leaky ReLU(None, 20)
Dense(None, 10)
Leaky ReLU(None, 10)
Dense(None, 10)
Leaky ReLU(None, 10)
Dense(None, 20)
Input (conventional DDoS)(None, 40)
Table 7. Training parameter settings of CycleGAN generating system.
Table 7. Training parameter settings of CycleGAN generating system.
Epoch/Batch SizeLearning RateOptimizerLambdaMu
500/600.00014Adam100.1
Table 8. TPRs of ML-based DDoS detectors and SDGAN on adversarial DDoS attacks.
Table 8. TPRs of ML-based DDoS detectors and SDGAN on adversarial DDoS attacks.
NSL-KDDCIC-IDS2018
RF0.1770.185
KNN0.1590.161
SVM0.1370.142
Naïve Bayes0.0960.138
SDGAN0.8570.872
Table 9. TPRs of ML-based DDoS detections on unseen adversarial DDoS attacks.
Table 9. TPRs of ML-based DDoS detections on unseen adversarial DDoS attacks.
RFKNNSVMNBSDGAN
TPR0.0940.0470.0340.0310.709
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Shieh, C.-S.; Nguyen, T.-T.; Lin, W.-W.; Lai, W.K.; Horng, M.-F.; Miu, D. Detection of Adversarial DDoS Attacks Using Symmetric Defense Generative Adversarial Networks. Electronics 2022, 11, 1977. https://doi.org/10.3390/electronics11131977

AMA Style

Shieh C-S, Nguyen T-T, Lin W-W, Lai WK, Horng M-F, Miu D. Detection of Adversarial DDoS Attacks Using Symmetric Defense Generative Adversarial Networks. Electronics. 2022; 11(13):1977. https://doi.org/10.3390/electronics11131977

Chicago/Turabian Style

Shieh, Chin-Shiuh, Thanh-Tuan Nguyen, Wan-Wei Lin, Wei Kuang Lai, Mong-Fong Horng, and Denis Miu. 2022. "Detection of Adversarial DDoS Attacks Using Symmetric Defense Generative Adversarial Networks" Electronics 11, no. 13: 1977. https://doi.org/10.3390/electronics11131977

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop