Canopy exhibits minimal erroneous mitigation of be-
nign clients, achieving a precision of 99%. Finally,
we showed that Canopy’s capabilities generalize well
to LSDDoS attacks not included in its training dataset,
identifying never-before-seen attacks within 750 mil-
liseconds.
ACKNOWLEDGEMENTS
This research was developed with funding from
the Defense Advanced Research Projects Agency
(DARPA) under Contract No. HR0011-16-C-0060.
This document was cleared for release under Distri-
bution Statement ”A” (Approved for Public Release,
Distribution Unlimited). The views, opinions, and/or
findings expressed are those of the authors and should
not be interpreted as representing the official views
or policies of the Department of Defense of the U.S.
Government. In alphabetical order, we would like to
thank Patrick Dwyer, Robert Gove, Heather Hardway,
Bryan Hoyle, Melissa Kilby, Alex Lim, Sean Morgan,
David Slater, and Scott Wimer, for their contributions
to the project.
REFERENCES
Bai, S., Kolter, J. Z., and Koltun, V. (2018). An em-
pirical evaluation of generic convolutional and recur-
rent networks for sequence modeling. arXiv preprint
arXiv:1803.01271.
Bystr
¨
om, C., Heyman, J., Hamr
´
en, J., and Heyman, H.
(2019). Locust. https://github.com/locustio/locust.
Demoulin, H. M., Pedisich, I., Phan, L. T. X., and Loo,
B. T. (2018). Automated detection and mitigation of
application-level asymmetric dos attacks. In Proceed-
ings of the Afternoon Workshop on Self-Driving Net-
works, pages 36–42.
Demoulin, H. M., Pedisich, I., Vasilakis, N., Liu, V., Loo,
B. T., and Phan, L. T. X. (2019). Detecting asymmet-
ric application-layer denial-of-service attacks in-flight
with finelame. In 2019 {USENIX} Annual Technical
Conference ({USENIX}{ATC} 19), pages 693–708.
Fayaz, S. K., Tobioka, Y., Sekar, V., and Bailey, M. (2015).
Bohatei: Flexible and elastic ddos defense. In 24th
USENIX Security Symposium (USENIX Security 15),
pages 817–832, Washington, D.C. USENIX Associa-
tion.
Hornby, T. (2012). Sockstress. https://github.com/defuse/
sockstress.
Hury, I. (2019). Noisy. https://github.com/1tayH/noisy.
Krebs, B. (2016). Krebsonsecurity hit with record ddos.
Kuzmanovic, A. and Knightly, E. W. (2003). Low-rate tcp-
targeted denial of service attacks: the shrew vs. the
mice and elephants. In Proceedings of the 2003 con-
ference on Applications, technologies, architectures,
and protocols for computer communications, pages
75–86.
Lima Filho, F. S. d., Silveira, F. A., de Medeiros Brito Ju-
nior, A., Vargas-Solar, G., and Silveira, L. F. (2019).
Smart detection: an online approach for dos/ddos at-
tack detection using machine learning. Security and
Communication Networks, 2019.
Makrushin, D. (2013). The cost of launching a ddos attack.
Markoff, J. (2008). Before the gunfire, cyberattacks.
Modi, H. (2018). Introducing netscout’s threat intelligence
report.
Moore, D., Shannon, C., J. Brown, D., M. Voelker, G., and
Savage, S. (2006). Inferring internet denial-of-service
activity. ACM Trans. Comput. Syst., 24:115–139.
Plante, C. (2015). Valve’s $18 million dota 2 tournament
delayed by ddos attack.
Ranjan, S., Swaminathan, R., Uysal, M., Nucci, A.,
and Knightly, E. (2008). Ddos-shield: Ddos-
resilient scheduling to counter application layer at-
tacks. IEEE/ACM Transactions on networking,
17(1):26–39.
Saied, A., Overill, R. E., and Radzik, T. (2016). Detection
of known and unknown ddos attacks using artificial
neural networks. Neurocomputing, 172:385–393.
Sharafaldin, I., Lashkari, A. H., and Ghorbani, A. A.
(2018). Toward generating a new intrusion detec-
tion dataset and intrusion traffic characterization. In
ICISSP, pages 108–116.
Shekyan, S. (2011). Slowhttptest. https://github.com/
shekyan/slowhttptest.
Siracusano, M., Shiaeles, S., and Ghita, B. (2018). Detec-
tion of lddos attacks based on tcp connection param-
eters. In 2018 Global Information Infrastructure and
Networking Symposium (GIIS), pages 1–6. IEEE.
Specht, S. and Lee, R. (2003). Taxonomies of Dis-
tributed Denial of ServiceNetworks, Attacks, Tools,
and Countermeasures. Technical report, Princeton Ar-
chitecture Laboratory for Multimedia and Security.
Stampar, M. (2011). Killapachepy. https://github.com/
tkisason/KillApachePy/.
Tripathi, N. and Mehtre, B. (2013). Dos and ddos attacks:
Impact, analysis and countermeasures. pages 1–6.
Valialkin, A. (2014). Goloris. https://github.com/valyala/
goloris.
Wang, C., Miu, T. T., Luo, X., and Wang, J. (2017).
Skyshield: A sketch-based defense system against ap-
plication layer ddos attacks. IEEE Transactions on
Information Forensics and Security, 13(3):559–573.
Zhang, C., Cai, Z., Chen, W., Luo, X., and Yin, J. (2012).
Flow level detection and filtering of low-rate ddos.
Computer Networks, 56(15):3417–3431.
Zhou, L., Liao, M., Yuan, C., and Zhang, H. (2017). Low-
rate ddos attack detection using expectation of packet
size. Security and Communication Networks, 2017.
Canopy: A Learning-based Approach for Automatic Low-and-Slow DDoS Mitigation
367