{"title":"基于深度学习的基于NetFlow数据的反射攻击预测","authors":"Edward Chuah , Arshad Jhumka , Aladdin Ayesh","doi":"10.1016/j.cose.2025.104527","DOIUrl":null,"url":null,"abstract":"<div><div>Large networks provide tremendous support for the deployment of networked services with fast response times by deploying a large number of servers and high-speed routers. While several techniques exist to detect network attacks, predicting future attacks can help to enhance the security of the network. Reflection attacks are known to be one of the most common causes of service disruption in large networks. A reflection attack is a special type of Distributed Denial-of-Service (DDoS) attack that hides the identity of the attacker and floods the network with a large volume of malicious traffic by using reflectors. Modern networks generate a large volume of NetFlow data, and analyzing this data is an advocated basis for identifying reflection attacks. A comprehensive analysis of 3.1 billion NetFlow records obtained from a large enterprise network is conducted, and reflection attacks on the Domain Name Service (DNS) and NetBIOS servers are identified in the NetFlow data. As far as it is known, there is no work that evaluated Temporal Convolution Network (TCN), Recurrent Neural Network (RNN) and Long Short Term Memory (LSTM) deep learning (DL) models to predict reflection attacks in a large network. Thus, the aim of this paper is to determine if TCN, RNN and LSTM can predict reflection attacks using NetFlow data. This paper proposes an approach to predict reflection attacks and evaluates TCN, RNN and LSTM on real NetFlow data. The results from this study show that: (a) RNN and LSTM predicted DNS server reflection attacks with the highest coefficient-of-determination (<span><math><msup><mrow><mi>R</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span>) value that ranged from 0.39 to 0.992 on different dates, (b) RNN, LSTM and TCN predicted NetBIOS server reflection attacks with the highest value of <span><math><msup><mrow><mi>R</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span> that ranged from 0.749 to 0.999 on different dates, (c) the percentage of packets generated by DNS server reflection attacks ranged from 0.001% to 18%, (d) the percentage of packets generated by NetBIOS server reflection attacks ranged from 0.2% to 16%, (e) the percentage of source and destination devices associated with DNS server reflection attacks ranged from 0.0006% to 0.022% and (f) the percentage of source and destination devices associated with NetBIOS server reflection attacks ranged from 0.071% to 34%. The outcomes are: (a) RNN and LSTM predicted DNS server reflection attacks with high accuracy on 12 dates, (b) RNN, LSTM and TCN predicted NetBIOS server reflection attacks with high accuracy on 14 dates, (c) RNN, LSTM and TCN predicted DNS server reflection attacks with low accuracy on 2 dates, (d) the traffic generated by DNS and NetBIOS servers reflection attacks did not overwhelm the network, and (e) a small number of source and destination devices are associated with these reflection attacks.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"156 ","pages":"Article 104527"},"PeriodicalIF":4.8000,"publicationDate":"2025-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Deep learning-based prediction of reflection attacks using NetFlow data\",\"authors\":\"Edward Chuah , Arshad Jhumka , Aladdin Ayesh\",\"doi\":\"10.1016/j.cose.2025.104527\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Large networks provide tremendous support for the deployment of networked services with fast response times by deploying a large number of servers and high-speed routers. While several techniques exist to detect network attacks, predicting future attacks can help to enhance the security of the network. Reflection attacks are known to be one of the most common causes of service disruption in large networks. A reflection attack is a special type of Distributed Denial-of-Service (DDoS) attack that hides the identity of the attacker and floods the network with a large volume of malicious traffic by using reflectors. Modern networks generate a large volume of NetFlow data, and analyzing this data is an advocated basis for identifying reflection attacks. A comprehensive analysis of 3.1 billion NetFlow records obtained from a large enterprise network is conducted, and reflection attacks on the Domain Name Service (DNS) and NetBIOS servers are identified in the NetFlow data. As far as it is known, there is no work that evaluated Temporal Convolution Network (TCN), Recurrent Neural Network (RNN) and Long Short Term Memory (LSTM) deep learning (DL) models to predict reflection attacks in a large network. Thus, the aim of this paper is to determine if TCN, RNN and LSTM can predict reflection attacks using NetFlow data. This paper proposes an approach to predict reflection attacks and evaluates TCN, RNN and LSTM on real NetFlow data. The results from this study show that: (a) RNN and LSTM predicted DNS server reflection attacks with the highest coefficient-of-determination (<span><math><msup><mrow><mi>R</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span>) value that ranged from 0.39 to 0.992 on different dates, (b) RNN, LSTM and TCN predicted NetBIOS server reflection attacks with the highest value of <span><math><msup><mrow><mi>R</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span> that ranged from 0.749 to 0.999 on different dates, (c) the percentage of packets generated by DNS server reflection attacks ranged from 0.001% to 18%, (d) the percentage of packets generated by NetBIOS server reflection attacks ranged from 0.2% to 16%, (e) the percentage of source and destination devices associated with DNS server reflection attacks ranged from 0.0006% to 0.022% and (f) the percentage of source and destination devices associated with NetBIOS server reflection attacks ranged from 0.071% to 34%. The outcomes are: (a) RNN and LSTM predicted DNS server reflection attacks with high accuracy on 12 dates, (b) RNN, LSTM and TCN predicted NetBIOS server reflection attacks with high accuracy on 14 dates, (c) RNN, LSTM and TCN predicted DNS server reflection attacks with low accuracy on 2 dates, (d) the traffic generated by DNS and NetBIOS servers reflection attacks did not overwhelm the network, and (e) a small number of source and destination devices are associated with these reflection attacks.</div></div>\",\"PeriodicalId\":51004,\"journal\":{\"name\":\"Computers & Security\",\"volume\":\"156 \",\"pages\":\"Article 104527\"},\"PeriodicalIF\":4.8000,\"publicationDate\":\"2025-05-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0167404825002160\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825002160","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Deep learning-based prediction of reflection attacks using NetFlow data
Large networks provide tremendous support for the deployment of networked services with fast response times by deploying a large number of servers and high-speed routers. While several techniques exist to detect network attacks, predicting future attacks can help to enhance the security of the network. Reflection attacks are known to be one of the most common causes of service disruption in large networks. A reflection attack is a special type of Distributed Denial-of-Service (DDoS) attack that hides the identity of the attacker and floods the network with a large volume of malicious traffic by using reflectors. Modern networks generate a large volume of NetFlow data, and analyzing this data is an advocated basis for identifying reflection attacks. A comprehensive analysis of 3.1 billion NetFlow records obtained from a large enterprise network is conducted, and reflection attacks on the Domain Name Service (DNS) and NetBIOS servers are identified in the NetFlow data. As far as it is known, there is no work that evaluated Temporal Convolution Network (TCN), Recurrent Neural Network (RNN) and Long Short Term Memory (LSTM) deep learning (DL) models to predict reflection attacks in a large network. Thus, the aim of this paper is to determine if TCN, RNN and LSTM can predict reflection attacks using NetFlow data. This paper proposes an approach to predict reflection attacks and evaluates TCN, RNN and LSTM on real NetFlow data. The results from this study show that: (a) RNN and LSTM predicted DNS server reflection attacks with the highest coefficient-of-determination () value that ranged from 0.39 to 0.992 on different dates, (b) RNN, LSTM and TCN predicted NetBIOS server reflection attacks with the highest value of that ranged from 0.749 to 0.999 on different dates, (c) the percentage of packets generated by DNS server reflection attacks ranged from 0.001% to 18%, (d) the percentage of packets generated by NetBIOS server reflection attacks ranged from 0.2% to 16%, (e) the percentage of source and destination devices associated with DNS server reflection attacks ranged from 0.0006% to 0.022% and (f) the percentage of source and destination devices associated with NetBIOS server reflection attacks ranged from 0.071% to 34%. The outcomes are: (a) RNN and LSTM predicted DNS server reflection attacks with high accuracy on 12 dates, (b) RNN, LSTM and TCN predicted NetBIOS server reflection attacks with high accuracy on 14 dates, (c) RNN, LSTM and TCN predicted DNS server reflection attacks with low accuracy on 2 dates, (d) the traffic generated by DNS and NetBIOS servers reflection attacks did not overwhelm the network, and (e) a small number of source and destination devices are associated with these reflection attacks.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.