Skip to main content
Top
Published in: Automatic Control and Computer Sciences 5/2019

01-09-2019

Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset

Published in: Automatic Control and Computer Sciences | Issue 5/2019

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recent trends have revealed that DDoS attacks contribute to the majority of overall network attacks. Networks face challenges in distinguishing between legitimate and malicious flows. The testing and implementation of DDoS strategies are not easy to deploy due to many factors like complexities, rigidity, cost, and vendor specific architecture of current networking equipment and protocols. Work is being done to detect DDoS attacks by application of Machine Learning (ML) models but to find out the best ML model among the given choices, is still an open question. This work is motivated by two research questions: 1) which supervised learning algorithm will give the best outcomes to detect DDoS attacks. 2) What would be the accuracy of training these algorithms on a real-life dataset? We achieved more than 96% accuracy in the case of Random Forest Classifier and validated our results using two metrics. The outcome was also compared with the other works to confirm its adequacy. We also present a detailed analysis to support our findings.
Literature
1.
go back to reference Cybersecurity Trends, 2018. https://www.incapsula.com/ddos/attack-glossary/high-orbit-ion-cannon.html. Accessed February 5, 2018. Cybersecurity Trends, 2018. https://​www.​incapsula.​com/​ddos/​attack-glossary/​high-orbit-ion-cannon.​html.​ Accessed February 5, 2018.
2.
go back to reference DDoS Attack, 2018. https://en.wikipedia.org/wiki/Denial-of-service_attack. Accessed February 8, 2018. DDoS Attack, 2018. https://​en.​wikipedia.​org/​wiki/​Denial-of-service_​attack.​ Accessed February 8, 2018.
3.
go back to reference Hacking Incidents, 2018. https://en.wikipedia.org/wiki/List_of_security_hacking_incidents. Accessed February 15, 2018. Hacking Incidents, 2018. https://​en.​wikipedia.​org/​wiki/​List_​of_​security_​hacking_​incidents.​ Accessed February 15, 2018.
4.
go back to reference Transformation of DDoS attacks in Global warefare, 2018. https://qz.com/860630/ddos-attacks-have-gone-from-a-minor-nuisance-to-a-possible-new-form-of-global-warfare/. Accessed January 1, 2018. Transformation of DDoS attacks in Global warefare, 2018. https://​qz.​com/​860630/​ddos-attacks-have-gone-from-a-minor-nuisance-to-a-possible-new-form-of-global-warfare/​.​ Accessed January 1, 2018.
5.
go back to reference DDoS attacks Trend Report, 2018. https://www.cdnetworks.com/CDNetworks_Q3_2017_DDoS%20Attack% 20Trends%20Report_EN_201712.pdf. Accessed February 26, 2018. DDoS attacks Trend Report, 2018. https://​www.​cdnetworks.​com/​CDNetworks_​Q3_​2017_​DDoS%20Attack% 20Trends%20Report_EN_201712.pdf. Accessed February 26, 2018.
6.
go back to reference Robinson, R. and Thomas, C., Ranking of machine learning algorithms based on the performance in classifying DDoS attacks, Proceedings of the IEEE Recent Advances in Intelligent Computational Systems (RAICS), Trivandrum, 2015, pp. 185–190. Robinson, R. and Thomas, C., Ranking of machine learning algorithms based on the performance in classifying DDoS attacks, Proceedings of the IEEE Recent Advances in Intelligent Computational Systems (RAICS), Trivandrum, 2015, pp. 185–190.
7.
go back to reference Azab, A., Alazab, M., and Aiash, M., Machine learning based Botnet identification traffic, 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, 2016, pp. 1788–1794. Azab, A., Alazab, M., and Aiash, M., Machine learning based Botnet identification traffic, 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, 2016, pp. 1788–1794.
8.
go back to reference Agrawal, P.K., Gupta, B.B., and Jain, S., SVM based scheme for predicting number of zombies in a DDoS attack, 2011 European Intelligence and Security Informatics Conference, Athens, 2011, pp. 178–182. Agrawal, P.K., Gupta, B.B., and Jain, S., SVM based scheme for predicting number of zombies in a DDoS attack, 2011 European Intelligence and Security Informatics Conference, Athens, 2011, pp. 178–182.
9.
go back to reference Chonka, A., Zhou, W., Singh, J., and Xiang, Y., Detecting and tracing DDoS attacks by intelligent decision prototype, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Hong Kong, 2008, pp. 578–583. Chonka, A., Zhou, W., Singh, J., and Xiang, Y., Detecting and tracing DDoS attacks by intelligent decision prototype, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Hong Kong, 2008, pp. 578–583.
10.
go back to reference Jalil, K.A., Kamarudin, M.H., and Masrek, M.N., Comparison of machine learning algorithms performance in detecting network intrusion, 2010 International Conference on Networking and Information Technology, Manila, 2010, pp. 221–226. Jalil, K.A., Kamarudin, M.H., and Masrek, M.N., Comparison of machine learning algorithms performance in detecting network intrusion, 2010 International Conference on Networking and Information Technology, Manila, 2010, pp. 221–226.
11.
go back to reference Balkanli, E., Alves, J., and Zincir-Heywood, A.N., Supervised learning to detect DDoS attacks, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), Orlando, FL, 2014, pp. 1–8. Balkanli, E., Alves, J., and Zincir-Heywood, A.N., Supervised learning to detect DDoS attacks, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), Orlando, FL, 2014, pp. 1–8.
12.
go back to reference Saad, S., et al., Detecting P2P Botnets through network behavior analysis and Machine Learning, 2011 Ninth Annual International Conference on Privacy, Security and Trust, Montreal, QC, 2011, pp. 174–180. Saad, S., et al., Detecting P2P Botnets through network behavior analysis and Machine Learning, 2011 Ninth Annual International Conference on Privacy, Security and Trust, Montreal, QC, 2011, pp. 174–180.
13.
go back to reference Application of Machine Learning, 2018. https://medium.com/app-affairs/9-applications-of-machine-learning-from-day-to-day-life-112a47a429d0. Accessed February 5, 2018. Application of Machine Learning, 2018. https://​medium.​com/​app-affairs/​9-applications-of-machine-learning-from-day-to-day-life-112a47a429d0.​ Accessed February 5, 2018.
14.
go back to reference Ayon Dey, Machine learning algorithms: A review, Int. J. Comput. Sci. Inf. Technol., 2016, vol. 7, no. 3, pp. 1174–1179. Ayon Dey, Machine learning algorithms: A review, Int. J. Comput. Sci. Inf. Technol., 2016, vol. 7, no. 3, pp. 1174–1179.
15.
go back to reference Logistic Regression, 2018. https://machinelearningmastery.com/logistic-regression-for-machine-learning/. Accessed December 16, 2017. Logistic Regression, 2018. https://​machinelearningm​astery.​com/​logistic-regression-for-machine-learning/​.​ Accessed December 16, 2017.
16.
go back to reference Types of Machine Learning Algorithms, 2017. https://towardsdatascience.com/types-of-machine-learning-algorithms-you-should-know-953a08248861. Accessed December 12, 2017. Types of Machine Learning Algorithms, 2017. https://​towardsdatascien​ce.​com/​types-of-machine-learning-algorithms-you-should-know-953a08248861.​ Accessed December 12, 2017.
17.
go back to reference Supervised Machine Learning, 2017. https://en.wikipedia.org/wiki/Supervised_learning#Algorithms. Accessed October 2, 2017. Supervised Machine Learning, 2017. https://​en.​wikipedia.​org/​wiki/​Supervised_​learning#Algorithms. Accessed October 2, 2017.
18.
go back to reference Sci-kit Learn, Machine Learning in Python, 2017. http://scikit-learn.org/stable/. Accessed November 5, 2017. Sci-kit Learn, Machine Learning in Python, 2017. http://​scikit-learn.​org/​stable/​.​ Accessed November 5, 2017.
19.
go back to reference Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani, Toward generating a new intrusion detection dataset and intrusion traffic characterization, 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, 2018. Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani, Toward generating a new intrusion detection dataset and intrusion traffic characterization, 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, 2018.
20.
go back to reference DDoS Attacks, 2017. https://en.wikipedia.org/wiki/Denial-of-service_attack. Accessed November 14, 2017. DDoS Attacks, 2017. https://​en.​wikipedia.​org/​wiki/​Denial-of-service_​attack.​ Accessed November 14, 2017.
21.
go back to reference Chaudhary, A., Kolhe, S., and Kamal, R., An improved random forest classifier for multi-class classification, Inf. Process. Agric., 2016, vol. 3, no. 4, pp. 215–222. Chaudhary, A., Kolhe, S., and Kamal, R., An improved random forest classifier for multi-class classification, Inf. Process. Agric., 2016, vol. 3, no. 4, pp. 215–222.
22.
go back to reference Bharathidason, S. and Venkataeswaran, C.J., Improving classification accuracy based on random forest model with uncorrelated high performing trees, Int. J. Comput. Appl., 2014, vol. 101, no. 13, pp. 26–30. Bharathidason, S. and Venkataeswaran, C.J., Improving classification accuracy based on random forest model with uncorrelated high performing trees, Int. J. Comput. Appl., 2014, vol. 101, no. 13, pp. 26–30.
24.
go back to reference Almseidin, M., Alzubi, S., and Kovacs, M., Alkasassbeh, Evaluation of machine learning algorithms for intrusion detection system, 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), 2017, pp. 277–282. Almseidin, M., Alzubi, S., and Kovacs, M., Alkasassbeh, Evaluation of machine learning algorithms for intrusion detection system, 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), 2017, pp. 277–282.
25.
go back to reference Gharib, A., Sharafaldin, I., Lashkari, A.H., and Ghorbani, A.A., An evaluation framework for intrusion detection dataset, Proc. 2016 International Conference on Information Science and Security (ICISS), 2016, pp. 1–6. Gharib, A., Sharafaldin, I., Lashkari, A.H., and Ghorbani, A.A., An evaluation framework for intrusion detection dataset, Proc. 2016 International Conference on Information Science and Security (ICISS), 2016, pp. 1–6.
Metadata
Title
Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset
Publication date
01-09-2019
Published in
Automatic Control and Computer Sciences / Issue 5/2019
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411619050043

Other articles of this Issue 5/2019

Automatic Control and Computer Sciences 5/2019 Go to the issue