A Machine Learning-Based Distributed Denial of Service Detection Approach for Early Warning in Internet Exchange Points

被引:0
作者
Alhayani S. [1 ]
Murphy D.R. [1 ]
机构
[1] School of Technology and Innovation, College of Business, Innovation, Leadership, and Technology (BILT), Marymount University, Arlington, 22207, VA
关键词
chi-square; distributed denial of service; feature selection; Internet exchange point; machine learning; Saudi Arabia IXP (SAIXP);
D O I
10.32604/CMC.2023.038003
中图分类号
学科分类号
摘要
The Internet service provider (ISP) is the heart of any country’s Internet infrastructure and plays an important role in connecting to the World Wide Web. Internet exchange point (IXP) allows the interconnection of two or more separate network infrastructures. All Internet traffic entering a country should pass through its IXP. Thus, it is an ideal location for performing malicious traffic analysis. Distributed denial of service (DDoS) attacks are becoming a more serious daily threat. Malicious actors in DDoS attacks control numerous infected machines known as botnets. Botnets are used to send numerous fake requests to overwhelm the resources of victims and make them unavailable for some periods. To date, such attacks present a major devastating security threat on the Internet. This paper proposes an effective and efficient machine learning (ML)-based DDoS detection approach for the early warning and protection of the Saudi Arabia Internet exchange point (SAIXP) platform. The effectiveness and efficiency of the proposed approach are verified by selecting an accurate ML method with a small number of input features. A chi-square method is used for feature selection because it is easier to compute than other methods, and it does not require any assumption about feature distribution values. Several ML methods are assessed using holdout and 10-fold tests on a public large-size dataset. The experiments showed that the performance of the decision tree (DT) classifier achieved a high accuracy result (99.98%) with a small number of features (10 features). The experimental results confirm the applicability of using DT and chi-square for DDoS detection and early warning in SAIXP. © 2023 Tech Science Press. All rights reserved.
引用
收藏
页码:2235 / 2259
页数:24
相关论文
共 39 条
[1]  
Rao S., Verma A. K., Bhatia T., Evolving cyber threats, combating techniques, and open issues in online social networks, Handbook of Research on Cyber Crime and Information Privacy, pp. 219-235, (2021)
[2]  
Bindra N., Sood M., Detecting ddos attacks using machine learning techniques and contemporary intrusion detection dataset, Automatic Control Computer Sciences, 53, 5, pp. 419-428, (2019)
[3]  
Dietzel C., Wichtlhuber M., Smaragdakis G., Feldmann A., Stellar: Network attack mitigation using advanced blackholing, Proc. of the 14th Int. Conf. on Emerging Networking Experiments and Technologies, pp. 152-164, (2018)
[4]  
Chatzis N., Smaragdakis G., Bottger J., Krenc T., Feldmann A., On the benefits of using a large ixp as an internet vantage point, Proc. of the 2013 Conf. on Internet Measurement Conf, pp. 333-346, (2013)
[5]  
Kobialka D., Kaspersky lab study: Average cost of enterprise ddos attack totals $2M, MSSP Alert, (2018)
[6]  
Buragohain C., Kalita M. J., Singh S., Bhattacharyya D. K., Anomaly based ddos attack detection, International Journal of Computer Applications, 123, 17, pp. 35-40, (2015)
[7]  
Nadiammai G., Hemalatha M., Effective approach toward intrusion detection system using data mining techniques, Egyptian Informatics Journal, 15, 1, pp. 37-50, (2014)
[8]  
Rungta K., Tensorflow in 1 day: Make your own neural network, (2019)
[9]  
Schmidhuber J., Deep learning in neural networks: An overview, Neural Networks, 61, 3, pp. 85-117, (2015)
[10]  
Rowe B., Reeves D., Gallaher M., The role of internet service providers in cyber security, Computers & Security, 28, 1, pp. 1-11, (2009)