Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Pradnya Kasture, Tejas Chougule, Dhananjay Patil, Prithviraj Mahapure
DOI Link: https://doi.org/10.22214/ijraset.2023.53133
Certificate: View Certificate
DDoS attacks are an attempt to prevent the service from being unavailable by overloading the server with malicious traffic. In the past few years, distributed denial of service attacks is becoming the most difficult and burdensome problem. The number and magnitude of attacks have increased from few megabytes of data to 100s of terabytes of data these days. As there are different attack patterns or new types of attacks, it is difficult to detect such attacks effectively. New techniques for generating and mitigating distributed denial of service attacks have been developed in the present paper, which demonstrate that they are far superior to those currently used. In addition, in order to carry out a thorough investigation of the challenges presented by distributed denial of service attacks, we classify DDoS attack methods and techniques used for their detection. We\'re comparing the attack module to a few other tools out there.
I. INTRODUCTION
The SVM algorithm is utilized for DoS attack detection by extracting flow statistics associated with such attacks. This method demonstrates advantages in terms of low resource consumption and a high detection rate. The crucial aspect lies in extracting the time interval information. However, a drawback of this approach is the presence of detection hysteresis, leading to potential delays and less accurate identification of attack behaviours. The authors have proposed a framework designed for detecting and mitigating DoS attacks in large-scale networks, which may not be suitable for smaller deployments.
In another study, a mechanism for DoS attack detection is introduced, which relies on a database containing legitimate source and destination IP addresses. By employing the non-parametric cumulative algorithm CUSUM, this method analyzes the abnormal characteristics exhibited by source and destination IP addresses during a DoS attack, effectively identifying such attacks. However, the approach requires adjusting and determining the appropriate threshold for optimal performance.
Regarding DoS attack detection in SDN networks, it is observed that information entropy and the utilization of data mining algorithms, particularly the SVM algorithm, play a significant role. Nevertheless, the information entropy approach suffers from a high false positive rate, while the SVM algorithm necessitates determining the number of neurons in advance. Consequently, this paper summarizes the characteristics of several DoS attacks, collects information from the switch flow table, extracts a matrix of characteristic values based on a six-tuple representation, and establishes an SVM classification model for detection purposes.
II. RELATED WORK
There has been significant research and work done on detecting and mitigating Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are more sophisticated and challenging to handle compared to traditional DoS attacks because they involve multiple attacking sources distributed across different networks. Here are some related works and approaches in the field of DDoS attack detection:
III. PROPOSED WORK
We succeeded in building a machine learning models like Support Vector machine (SVM) and random forest (RF). It uses the dataset for training and the testing the models which contains the packet headers (source/destination IP addresses, source/destination ports, protocol types), traffic rates (packet rates, byte rates), flow characteristics (flow duration, number of packets in a flow), and statistical metrics (mean, standard deviation, entropy, etc.) calculated over specific time windows or flows. It also includes the labels of each request. Using this dataset for training our model can detect if the attack is performed or not.
A. Here is How our SVM Model Works
B. And here is how our Random Forest algorithms Works
In conclusion, the project of DDoS attack detection using SVM and Random Forest demonstrates the effectiveness of machine learning algorithms in identifying and mitigating DDoS attacks. Both SVM and Random Forest are powerful classifiers that can analyse network traffic data and distinguish between normal traffic and DDoS attack patterns. The SVM algorithm utilizes support vectors to find an optimal hyperplane that separates the two classes, while Random Forest constructs an ensemble of decision trees to make aggregated predictions. By collecting a labelled dataset containing network traffic instances representing normal and attack traffic, relevant features can be extracted and used to train the SVM and Random Forest models. The models are then evaluated using test data to assess their performance in detecting DDoS attacks. Both SVM and Random Forest have their strengths and weaknesses. SVM is known for its ability to handle high-dimensional data and find optimal decision boundaries, while Random Forest excels at capturing complex relationships and is robust against overfitting. The project highlights the importance of feature selection, data preprocessing, and model evaluation to ensure accurate and reliable detection results. Additionally, ongoing monitoring and periodic updates are necessary to adapt to evolving DDoS attack techniques. Overall, the project provides insights into the application of machine learning algorithms in DDoS attack detection, showcasing the potential of SVM and Random Forest as effective tools in mitigating and protecting against DDoS attacks in network environments
[1] T. Subbulakshmi, K. BalaKrishnan, S. M. Shalinie, D. AnandKumar, V. GanapathiSubramanian and K. Kannathal, \"Detection of DDoS attacks using Enhanced Support Vector Machines with real time generated dataset,\" 2011 Third International Conference on Advanced Computing, Chennai, India, 2011, pp. 17-22, doi: 10.1109/ICoAC.2011.6165212. [2] A. E. Krasnov, D. N. Nikol\'skii, D. S. Repin, V. S. Galyaev and E. A. Zykova, \"Detecting DDoS Attacks Using the Analysis of Network Traffic as Dynamical System,\" 2018 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC), Moscow, Russia, 2018, pp. 1-7, doi: 10.1109/MoNeTeC.2018.8572034. [3] M. A. T. Laksono, Y. Purwanto and A. Novianty, \"DDoS detection using CURE clustering algorithm with outlier removal clustering for handling outliers,\" 2015 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC), Bandung, Indonesia, 2015, pp. 12-18, doi: 10.1109/ICCEREC.2015.7337029. [4] T. -C. Leung and C. -N. Lee, \"Flow-Based DDoS Detection Using Deep Neural Network with Radial Basis Function Neural Network,\" 2022 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Chiang Mai, Thailand, 2022, pp. 1774-1779, doi: 10.23919/APSIPAASC55919.2022.9980171. [5] M. S. E. Sayed, N. -A. Le-Khac, M. A. Azer and A. D. Jurcut, \"A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs,\" in IEEE Transactions on Cognitive Communications and Networking, vol. 8, no. 4, pp. 1862-1880, Dec. 2022, doi: 10.1109/TCCN.2022.3186331 [6] Y. Chen, K. Hwang and W. -S. Ku, \"Collaborative Detection of DDoS Attacks over Multiple Network Domains,\" in IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 12, pp. 1649-1662, Dec. 2007, doi: 10.1109/TPDS.2007.1111. [7] R. Yogesh Patil and L. Ragha, \"A rate limiting mechanism for defending against flooding based distributed denial of service attack,\" 2011 World Congress on Information and Communication Technologies, Mumbai, India, 2011, pp. 182-186, doi: 10.1109/WICT.2011.6141240.
Copyright © 2023 Pradnya Kasture, Tejas Chougule, Dhananjay Patil, Prithviraj Mahapure. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET53133
Publish Date : 2023-05-27
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here