Detection of DDoS Attacks Using Machine Learning Classification Algorithms

Full Text (PDF, 400KB), PP.89-97

Views: 0 Downloads: 0

Author(s)

Kishore Babu Dasari 1,* Nagaraju Devarakonda 2

1. Department of CSE, Acharya Nagarjuna University, Guntur, AP, India

2. School of Computer Science and Engineering, VIT-AP University, AP, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2022.06.07

Received: 20 Nov. 2021 / Revised: 2 Mar. 2022 / Accepted: 27 May 2022 / Published: 8 Dec. 2022

Index Terms

DDoS Attacks, CIC-DDoS2019, Logistic Regression, Decision Tree, Random Forest, Ada Boost, Gradient Boost, KNN, Naive Bayes

Abstract

The Internet is the most essential tool for communication in today's world. As a result, cyber-attacks are growing more often, and the severity of the consequences has risen as well. Distributed Denial of Service is one of the most effective and costly top five cyber attacks. Distributed Denial of Service (DDoS) is a type of cyber attack that prevents legitimate users from accessing network system resources. To minimize major damage, quick and accurate DDoS attack detection techniques are essential. To classify target classes, machine learning classification algorithms are faster and more accurate than traditional classification methods. This is a quantitative research applies Logistic Regression, Decision Tree, Random Forest, Ada Boost, Gradient Boost, KNN, and Naive Bayes classification algorithms to detect DDoS attacks on the CIC-DDoS2019 data set, which contains eleven different DDoS attacks each containing 87 features. In addition, evaluated classifiers’ performances in terms of evaluation metrics. Experimental results show that AdaBoost and Gradient Boost algorithms give the best classification results, Logistic Regression, KNN, and Naive Bayes give good classification results, Decision Tree and Random Forest produce poor classification results.

Cite This Paper

Kishore Babu Dasari, Nagaraju Devarakonda, "Detection of DDoS Attacks Using Machine Learning Classification Algorithms", International Journal of Computer Network and Information Security(IJCNIS), Vol.14, No.6, pp.89-97, 2022. DOI:10.5815/ijcnis.2022.06.07

Reference

[1]Kaur, G. (2020). A comparison of two hybrid ensemble techniques for network anomaly detection in spark distributed environment. Journal of Information Security and Applications, 55, 102601. https://doi.org/10.1016/J.JISA.2020.102601
[2]Kishore Babu Dasari, Dr Nagaraju Devarakonda. (2018). Distributed denial of service attacks, tools and defense mechanisms. International Journal of Pure and Applied Mathematics, 120(6), 3423–3437. https://acadpubl.eu/hub/2018-120-6/3/247.pdf
[3]Lu, K., Wu, D., Fan, J., Todorovic, S., & Nucci, A. (2007). Robust and efficient detection of DDoS attacks for large-scale internet. Computer Networks, 51(18), 5036–5056. https://doi.org/10.1016/J.COMNET.2007.08.008
[4]Bouyeddou, B., Kadri, B., Harrou, F., & Sun, Y. (2020). DDOS-attacks detection using an efficient measurement-based statistical mechanism. Engineering Science and Technology, an International Journal, 23(4), 870–878. https://doi.org/10.1016/j.jestch.2020.05.002
[5]Nilesh Vishwasrao Patil, C. Rama Krishna, Krishan Kumar, Distributed frameworks for detecting distributed denial of service attacks: A comprehensive review, challenges
[6]X. Liang and T. Znati, "An empirical study of intelligent approaches to DDoS detection in large scale networks," 2019 International Conference on Computing, Networking and Communications (ICNC), 2019, pp. 821-827, doi: 10.1109/ICCNC.2019.8685519.
[7]Suresh, M., & Anitha, R. (2011). Evaluating Machine Learning Algorithms for Detecting DDoS Attacks *. In CCIS (Vol. 196).
[8]L. Feinstein, D. Schnackenberg, R. Balupari and D. Kindred, "Statistical approaches to DDoS attack detection and response," Proceedings DARPA Information Survivability Conference and Exposition, 2003, pp. 303-314 vol.1, doi: 10.1109/DISCEX.2003.1194894.
[9]Majed, H., Noura, H. N., Salman, O., Malli, M., & Chehab, A. (2020). Efficient and secure statistical DDoS detection scheme. ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 153–161. https://doi.org/10.5220/0009873801530161
[10]T. Roempluk and O. Surinta, "A Machine Learning Approach for Detecting Distributed Denial of Service Attacks," 2019 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT-NCON), 2019, pp. 146-149, doi: 10.1109/ECTI-NCON.2019.8692243.
[11]K. B. V., N. D. G. and P. S. Hiremath, "Detection of DDoS Attacks in Software Defined Networks," 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), 2018, pp. 265-270, doi: 10.1109/CSITSS.2018.8768551.
[12]Batchu, R. K., & Seetha, H. (2021). A generalized machine learning model for DDoS attacks detection using hybrid feature selection and hyperparameter tuning. Computer Networks, 200, 108498. https://doi.org/10.1016/J.COMNET.2021.108498
[13]Y. Chen, X. Ma and X. Wu, "DDoS Detection Algorithm Based on Preprocessing Network Traffic Predicted Method and Chaos Theory," in IEEE Communications Letters, vol. 17, no. 5, pp. 1052-1054, May 2013, doi: 10.1109/LCOMM.2013.031913.130066.
[14]A. L. Buczak and E. Guven, "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," in IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153-1176, Second quarter 2016, doi: 10.1109/COMST.2015.2494502.
[15]W. Zhijun, L. Wenjing, L. Liang and Y. Meng, "Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey," in IEEE Access, vol. 8, pp. 43920-43943, 2020, DOI: 10.1109/ACCESS.2020.2976609.
[16]Dasari, K.B., Devarakonda, N. (2021). Detection of different DDoS attacks using machine learning classification algorithms. Ingénierie des Systèmes d’Information, Vol. 26, No. 5, pp. 461-468. http://dx.doi.org/10.18280/isi.260505
[17]Sambangi, S., & Gondi, L. (2020). A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression. Proceedings, 63(1), 51. https://doi.org/10.3390/proceedings2020063051
[18]Santos, R., Souza, D., Santo, W., Ribeiro, A., & Moreno, E. (2020). Machine learning algorithms to detect DDoS attacks in SDN. Concurrency and Computation: Practice and Experience, 32(16). https://doi.org/10.1002/cpe.5402
[19]D. Firdaus, R. Munadi and Y. Purwanto, "DDoS Attack Detection in Software Defined Network using Ensemble K-means++ and Random Forest," 2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), 2020, pp. 164-169, doi: 10.1109/ISRITI51436.2020.9315521.
[20]Y. Chen, J. Hou, Q. Li and H. Long, "DDoS Attack Detection Based on Random Forest," 2020 IEEE International Conference on Progress in Informatics and Computing (PIC), 2020, pp. 328-334, doi: 10.1109/PIC50277.2020.9350788.
[21]Shahraki, A., Abbasi, M., & Haugen, Ø. (2020). Boosting algorithms for network intrusion detection: A comparative evaluation of Real AdaBoost, Gentle AdaBoost and Modest AdaBoost. Engineering Applications of Artificial Intelligence, 94, 103770. https://doi.org/10.1016/J.ENGAPPAI.2020.103770
[22]Alamri, H. A., & Thayananthan, V. (2020). Bandwidth control mechanism and extreme gradient boosting algorithm for protecting software-defined networks against DDoS attacks. IEEE Access, 8, 194269–194288. https://doi.org/10.1109/ACCESS.2020.3033942
[23]Z. Chen, F. Jiang, Y. Cheng, X. Gu, W. Liu and J. Peng, "XGBoost Classifier for DDoS Attack Detection and Analysis in SDN-Based Cloud," 2018 IEEE International Conference on Big Data and Smart Computing (BigComp), 2018, pp. 251-256, doi: 10.1109/BigComp.2018.00044.
[24]R. F. Fouladi, C. E. Kayatas and E. Anarim, "Frequency based DDoS attack detection approach using naive Bayes classification," 2016 39th International Conference on Telecommunications and Signal Processing (TSP), 2016, pp. 104-107, doi: 10.1109/TSP.2016.7760838.
[25]X. Liang and T. Znati, "An empirical study of intelligent approaches to DDoS detection in large scale networks," 2019 International Conference on Computing, Networking and Communications (ICNC), 2019, pp. 821-827, doi: 10.1109/ICCNC.2019.8685519.
[26]Mekala, S., Padmaja Rani Supervisor, B., & Padmaja Rani, B. (2020). Article ID: IJARET_11_11_121 Kernel PCA Based Dimensionality Reduction Techniques for Preprocessing of Telugu Text Documents for Cluster Analysis. International Journal of Advanced Research in Engineering and Technology, 11(11), 1337–1352. https://doi.org/10.34218/IJARET.11.11.2020.121