Home > Research > Publications & Outputs > BCDM

Electronic data

  • Author accepted version

    Accepted author manuscript, 1.56 MB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network. / Wang, Yufu; Wang, Xingwei; Ni, Qiang et al.
In: IEEE Transactions on Network and Service Management, Vol. 21, No. 5, 31.10.2024, p. 5873-5887.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Wang, Y, Wang, X, Ni, Q, Yu, W & Huang, M 2024, 'BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network', IEEE Transactions on Network and Service Management, vol. 21, no. 5, pp. 5873-5887. https://doi.org/10.1109/tnsm.2024.3431701

APA

Wang, Y., Wang, X., Ni, Q., Yu, W., & Huang, M. (2024). BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network. IEEE Transactions on Network and Service Management, 21(5), 5873-5887. https://doi.org/10.1109/tnsm.2024.3431701

Vancouver

Wang Y, Wang X, Ni Q, Yu W, Huang M. BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network. IEEE Transactions on Network and Service Management. 2024 Oct 31;21(5):5873-5887. Epub 2024 Jul 22. doi: 10.1109/tnsm.2024.3431701

Author

Wang, Yufu ; Wang, Xingwei ; Ni, Qiang et al. / BCDM : An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network. In: IEEE Transactions on Network and Service Management. 2024 ; Vol. 21, No. 5. pp. 5873-5887.

Bibtex

@article{7eb3a61673734f78b100dd33973840c3,
title = "BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network",
abstract = "The rapid adoption of IPv6 has increased network access scale while also escalating the threat of Distributed Denial of Service (DDoS) attacks. By the time a DDoS attack is recognized, the overwhelming volume of attack traffic has already made mitigation extremely difficult. Therefore, continuous network monitoring is essential for early warning and defense preparation against DDoS attacks, requiring both sensitive perception of network changes when DDoS occurs and reducing monitoring overhead to adapt to network resource constraints. In this paper, we propose a novel DDoS incident monitoring mechanism that uses macro-level network traffic behavior as a monitoring anchor to detect subtle malicious behavior indicative of the existence of DDoS traffic in the network. This behavior feature can be abstracted from our designed traffic matrix sample by aggregating continuous IPv6 traffic. Compared to IPv4, the fixed-length header of IPv6 allows more efficient packet parsing in preprocessing. As the decision core of monitoring, we construct a lightweight Binary Convolution DDoS Monitoring (BCDM) model, compressed by binarized convolutional filters and hierarchical pooling strategies, which can detect the malicious behavior abstracted from input traffic matrix if DDoS traffic is involved, thereby signaling an ongoing DDoS attack. Experiment on IPv6 replayed CIC-DDoS2019 shows that BCDM, being lightweight in terms of parameter quantity and computational complexity, achieves monitoring accuracies of 90.9%, 96.4%, and 100% when DDoS incident intensities are as low as 6%, 10%, and 15%, respectively, significantly outperforming comparison methods.",
author = "Yufu Wang and Xingwei Wang and Qiang Ni and Wenjuan Yu and Min Huang",
year = "2024",
month = oct,
day = "31",
doi = "10.1109/tnsm.2024.3431701",
language = "English",
volume = "21",
pages = "5873--5887",
journal = "IEEE Transactions on Network and Service Management",
issn = "1932-4537",
publisher = "IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC",
number = "5",

}

RIS

TY - JOUR

T1 - BCDM

T2 - An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network

AU - Wang, Yufu

AU - Wang, Xingwei

AU - Ni, Qiang

AU - Yu, Wenjuan

AU - Huang, Min

PY - 2024/10/31

Y1 - 2024/10/31

N2 - The rapid adoption of IPv6 has increased network access scale while also escalating the threat of Distributed Denial of Service (DDoS) attacks. By the time a DDoS attack is recognized, the overwhelming volume of attack traffic has already made mitigation extremely difficult. Therefore, continuous network monitoring is essential for early warning and defense preparation against DDoS attacks, requiring both sensitive perception of network changes when DDoS occurs and reducing monitoring overhead to adapt to network resource constraints. In this paper, we propose a novel DDoS incident monitoring mechanism that uses macro-level network traffic behavior as a monitoring anchor to detect subtle malicious behavior indicative of the existence of DDoS traffic in the network. This behavior feature can be abstracted from our designed traffic matrix sample by aggregating continuous IPv6 traffic. Compared to IPv4, the fixed-length header of IPv6 allows more efficient packet parsing in preprocessing. As the decision core of monitoring, we construct a lightweight Binary Convolution DDoS Monitoring (BCDM) model, compressed by binarized convolutional filters and hierarchical pooling strategies, which can detect the malicious behavior abstracted from input traffic matrix if DDoS traffic is involved, thereby signaling an ongoing DDoS attack. Experiment on IPv6 replayed CIC-DDoS2019 shows that BCDM, being lightweight in terms of parameter quantity and computational complexity, achieves monitoring accuracies of 90.9%, 96.4%, and 100% when DDoS incident intensities are as low as 6%, 10%, and 15%, respectively, significantly outperforming comparison methods.

AB - The rapid adoption of IPv6 has increased network access scale while also escalating the threat of Distributed Denial of Service (DDoS) attacks. By the time a DDoS attack is recognized, the overwhelming volume of attack traffic has already made mitigation extremely difficult. Therefore, continuous network monitoring is essential for early warning and defense preparation against DDoS attacks, requiring both sensitive perception of network changes when DDoS occurs and reducing monitoring overhead to adapt to network resource constraints. In this paper, we propose a novel DDoS incident monitoring mechanism that uses macro-level network traffic behavior as a monitoring anchor to detect subtle malicious behavior indicative of the existence of DDoS traffic in the network. This behavior feature can be abstracted from our designed traffic matrix sample by aggregating continuous IPv6 traffic. Compared to IPv4, the fixed-length header of IPv6 allows more efficient packet parsing in preprocessing. As the decision core of monitoring, we construct a lightweight Binary Convolution DDoS Monitoring (BCDM) model, compressed by binarized convolutional filters and hierarchical pooling strategies, which can detect the malicious behavior abstracted from input traffic matrix if DDoS traffic is involved, thereby signaling an ongoing DDoS attack. Experiment on IPv6 replayed CIC-DDoS2019 shows that BCDM, being lightweight in terms of parameter quantity and computational complexity, achieves monitoring accuracies of 90.9%, 96.4%, and 100% when DDoS incident intensities are as low as 6%, 10%, and 15%, respectively, significantly outperforming comparison methods.

U2 - 10.1109/tnsm.2024.3431701

DO - 10.1109/tnsm.2024.3431701

M3 - Journal article

VL - 21

SP - 5873

EP - 5887

JO - IEEE Transactions on Network and Service Management

JF - IEEE Transactions on Network and Service Management

SN - 1932-4537

IS - 5

ER -