Improving distributed denial of service attack detection using supervised machine learning

被引:0
作者
Fathima A. [1 ,2 ]
Devi G.S. [1 ]
Faizaanuddin M. [3 ]
机构
[1] Dept.of Computer Applications, BSAR Crescent Institute of Science and Technology, Chennai
[2] Dept. Of CS & IT, Maulana Azad National Urdu University, Hyderabad
[3] Dept. of AI & Data Science, M.Tech Chaitanya Bharathi Institute of Technology, Hyderabad
来源
Measurement: Sensors | 2023年 / 30卷
关键词
Classification Algorithms; Cyber security; DDoS Attacks; Machine learning; Random Forest Algorithm;
D O I
10.1016/j.measen.2023.100911
中图分类号
学科分类号
摘要
Distributed denial-of-service (DDoS) attacks are a big problem for cyber security because they can cause a lot of damage to both people and companies. Distributed Denial of Service (DDoS) attacks have been seen to do a lot of damage to the networks and devices they are aimed at. These hacks slow down networks and use up buffer space, which makes resources unavailable. To solve this problem, “Supervised Machine Learning Models” have been used. Several machine learning techniques, such as Random Forest, K-Nearest Neighbors (KNN), and Logistic Regression, were used to figure out what was normal and what was an attack. This study used a sample of the CSE-CICIDS2018, CSE-CICIDS2017, and CICDoS datasets. The dataset was divided into two parts in which three fourth of the data was used for training and one fourth of the data for testing purpose. The proposed research attempt to classify the DDoS attack by using supervised machine learning classifiers. This approach employs three machine learning classifiers such as Random Forest, KNN and Logistic regression. Then we perform Feature Scaling by using Standard Scaler. Finally, the system was evaluated. Random forest classifier outperformed other classifiers with an accuracy of 97.6 % whereas KNN and Logistic regression achieved 97 % and 91.1 %. The study employed several Supervised Machine Learning techniques, including Random Forest, KNN, and Logistic Regression to identify the most effective algorithm for the test. Results demonstrate that Random Forest outperformed the other models. © The Authors
引用
收藏
相关论文
共 20 条
[1]  
Kaur D., Kaur P., Empirical analysis of Web attacks, Proc. Comput. Sci., 78, pp. 298-306, (2016)
[2]  
Islam M.N., Seera M., Loo C.K., A robust incremental clustering-based facial feature tracking, Appl. Soft Comput., 53, 53, pp. 34-44, (2017)
[3]  
Jeya P.G., Ravichandran M., Ravichandran C., Efficient classifier for r2l and u2r attacks, Int. J. Comput. Appl., 45, 21, pp. 28-32, (2012)
[4]  
Kang J., Oh S., Anomaly intrusion detection based on clustering a data stream, Int. J. Future Comput. Commun., 1, 1, pp. 17-20, (2012)
[5]  
Kim G., Lee S., Kim S., A novel hybrid intrusion detection method integrating anomaly detection with misuse detection, Expert Syst. Appl., 41, 4, pp. 1690-1700, (2017)
[6]  
Ramasubramanian K., Singh A., Machine Learning Theory and Practices,” Machine Learning Using R, Apress, Berkeley, CA, (2017)
[7]  
Feng W., Zhang Q., Hu G., Huang J.X., Mining network data for intrusion detection through combining Svms with ant colony networks, Future Generat. Comput. Syst., 37, pp. 127-140, (2014)
[8]  
Muniyandi A.P., Rajeswari R., Rajaram R., Network anomaly detection by cascading k-means clustering and C4.5 decision tree algorithm, Procedia Eng., 30, pp. 174-182, (2012)
[9]  
Cheng R., Xu R., Tang X., Sheng V.S., Cai C., An abnormal network flow feature sequence prediction approach for DDoS attacks detection in the big data environment, Comput. Mater. Continua (CMC), 55, 1, pp. 95-119, (2018)
[10]  
Depren O., Topallar M., Anarim E., Ciliz M.K., An intelligent intrusion detection system (ids) for anomaly and misuse detection in computer networks, Expert Syst. Appl., 29, 4, pp. 713-722, (2005)