Skip to main content
Top

2021 | OriginalPaper | Chapter

Detection and Classification of Distributed DoS Attacks Using Machine Learning

Authors : G. Usha, Mohak Narang, Akash Kumar

Published in: Computer Networks and Inventive Communication Technologies

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Distributed denial of service (DDoS) attacks target the websites and online services in which the attacker floods them with more traffic than the server or network that can hold. With the sophistication of technology and the rise of the Internet, such attacks are becoming more common and easier to perform. According to a study by the Cisco Visual Networking Index (VNI) in 2017, global projections of the overall number of DDoS attacks would significantly increase by 2022 and might cross 14.5 million marks, thereby doubling in number. A system is proposed that aims to provide an efficient way for the detection of DDoS attacks in a network. As previously, machine learning has been widely used for intrusion detection and classification of the type of attack compared to other techniques and intrusion detection system (IDS). This system makes use of different machine learning algorithms (extreme gradient boosting, K-nearest neighbour, stochastic gradient descent, and Naive Bayes) and a deep learning architecture (convoluted neural network) to identify attacks and classify them. The result shows that XGBoost achieves the highest accuracy, while CNN and KNN also give comparable figures. Our code is available at https://​github.​com/​mohak1/​Detection-and-Classification-of-Distributed-DoS-Attacks-using-Machine-Learning.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Oh D, Kim D, Ro WW (2014) A malicious pattern detection engine for embedded security systems in the Internet of Things. Sensors 14(12):24188–24211CrossRef Oh D, Kim D, Ro WW (2014) A malicious pattern detection engine for embedded security systems in the Internet of Things. Sensors 14(12):24188–24211CrossRef
3.
go back to reference Lee T-H, Wen C-H, Chang L-H, Chiang H-S, Hsieh M-C (2014) A lightweight intrusion detection scheme based on energy consumption analysis in 6LowPAN. In: Huang Y-M, Chao H-C, Deng D-J, Park JJJH (eds) Advanced technologies, embedded and multimedia for human-centric computing, vol 260. Lecture Notes in Electrical Engineering. Springer, Netherlands, pp 1205–1213CrossRef Lee T-H, Wen C-H, Chang L-H, Chiang H-S, Hsieh M-C (2014) A lightweight intrusion detection scheme based on energy consumption analysis in 6LowPAN. In: Huang Y-M, Chao H-C, Deng D-J, Park JJJH (eds) Advanced technologies, embedded and multimedia for human-centric computing, vol 260. Lecture Notes in Electrical Engineering. Springer, Netherlands, pp 1205–1213CrossRef
6.
go back to reference Al-issa AI, Al-Akhras M, ALsahli MS, Alawairdhi M (2019) Using machine learning to detect DoS attacks in wireless sensor networks. In: 2019 IEEE jordan international joint conference on electrical engineering and information technology (JEEIT), Amman, Jordan, pp 107–112 Al-issa AI, Al-Akhras M, ALsahli MS, Alawairdhi M (2019) Using machine learning to detect DoS attacks in wireless sensor networks. In: 2019 IEEE jordan international joint conference on electrical engineering and information technology (JEEIT), Amman, Jordan, pp 107–112
7.
go back to reference Alsheikh MA, Lin S, Niyato D, Tan H (2014) Machine learning in wireless sensor networks: algorithms, strategies, and applications. In: IEEE communications surveys and tutorials, vol 16, no 4, pp 1996–2018. Fourthquarter Alsheikh MA, Lin S, Niyato D, Tan H (2014) Machine learning in wireless sensor networks: algorithms, strategies, and applications. In: IEEE communications surveys and tutorials, vol 16, no 4, pp 1996–2018. Fourthquarter
10.
go back to reference Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: IEEE 53rd international carnahan conference on security technology, Chennai, India Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: IEEE 53rd international carnahan conference on security technology, Chennai, India
11.
go back to reference Graham JW (2009) Missing data analysis: making it work in the real world. Annu Rev Psychol 60:549–576CrossRef Graham JW (2009) Missing data analysis: making it work in the real world. Annu Rev Psychol 60:549–576CrossRef
13.
go back to reference Zhang H, Wei H, Tang Y, Pu Q (2019) Research on classification of scientific and technological documents based on Naive Bayes. In: Proceedings of the 2019 11th international conference on machine learning and computing (ICMLC ’19). Association for Computing Machinery, New York, NY, USA, pp 327–331 Zhang H, Wei H, Tang Y, Pu Q (2019) Research on classification of scientific and technological documents based on Naive Bayes. In: Proceedings of the 2019 11th international conference on machine learning and computing (ICMLC ’19). Association for Computing Machinery, New York, NY, USA, pp 327–331
14.
go back to reference Fouladi RF, Seifpoor T, Anarim E (2013) Frequency characteristics of DoS and DDoS attacks. In: Signal processing and communications applications conference (SIU), 2013 21st. IEEE, pp 1–4 Fouladi RF, Seifpoor T, Anarim E (2013) Frequency characteristics of DoS and DDoS attacks. In: Signal processing and communications applications conference (SIU), 2013 21st. IEEE, pp 1–4
15.
go back to reference Zhijun W, Yue M, Li D, Xie K (2015) Sedp-based detection of low-rate dos attacks. Int J Commun Syst 28(11):1772–1788CrossRef Zhijun W, Yue M, Li D, Xie K (2015) Sedp-based detection of low-rate dos attacks. Int J Commun Syst 28(11):1772–1788CrossRef
16.
go back to reference Kun W, Jiahai Y, Fengjuan C, Li C, Wang Z, Yin H (2014) Two-stage detection algorithm for ROQ attack based on localized periodicity analysis of traffic anomaly. In: 2014 23rd international conference on computer communication and networks (ICCCN). IEEE, pp 1–6 Kun W, Jiahai Y, Fengjuan C, Li C, Wang Z, Yin H (2014) Two-stage detection algorithm for ROQ attack based on localized periodicity analysis of traffic anomaly. In: 2014 23rd international conference on computer communication and networks (ICCCN). IEEE, pp 1–6
18.
go back to reference Saied A, Overill RE, Radzik T (2014) Artificial neural networks in the detection of known and unknown DDoS attacks: proof-of concept. Commun Comput Inf Sci 430:300–320 Saied A, Overill RE, Radzik T (2014) Artificial neural networks in the detection of known and unknown DDoS attacks: proof-of concept. Commun Comput Inf Sci 430:300–320
19.
go back to reference Kale M (2014) DDOS attack detection based on an ensemble of neural classifier. Int J Comput Sci Netw Secur 14(7):122–129 Kale M (2014) DDOS attack detection based on an ensemble of neural classifier. Int J Comput Sci Netw Secur 14(7):122–129
Metadata
Title
Detection and Classification of Distributed DoS Attacks Using Machine Learning
Authors
G. Usha
Mohak Narang
Akash Kumar
Copyright Year
2021
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-15-9647-6_78