Security Analysis of DDoS Attacks Using Machine Learning Algorithms in Networks Traffic

被引:36
作者
Alzahrani, Rami J. [1 ,2 ]
Alzahrani, Ahmed [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah 21589, Saudi Arabia
[2] Al Baha Univ, Fac Comp Sci & Informat Technol, Dept Comp Sci, Al Baha 65799, Saudi Arabia
关键词
cyber security; IoT; machine learning; intrusion detection system; IoT security; DDoS attack; INTRUSION DETECTION SYSTEM; INTERNET; FRAMEWORK; IOT;
D O I
10.3390/electronics10232919
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The recent advance in information technology has created a new era named the Internet of Things (IoT). This new technology allows objects (things) to be connected to the Internet, such as smart TVs, printers, cameras, smartphones, smartwatches, etc. This trend provides new services and applications for many users and enhances their lifestyle. The rapid growth of the IoT makes the incorporation and connection of several devices a predominant procedure. Although there are many advantages of IoT devices, there are different challenges that come as network anomalies. In this research, the current studies in the use of deep learning (DL) in DDoS intrusion detection have been presented. This research aims to implement different Machine Learning (ML) algorithms in WEKA tools to analyze the detection performance for DDoS attacks using the most recent CICDDoS2019 datasets. CICDDoS2019 was found to be the model with best results. This research has used six different types of ML algorithms which are K_Nearest_Neighbors (K-NN), super vector machine (SVM), naive bayes (NB), decision tree (DT), random forest (RF) and logistic regression (LR). The best accuracy result in the presented evaluation was achieved when utilizing the Decision Tree (DT) and Random Forest (RF) algorithms, 99% and 99%, respectively. However, the DT is better than RF because it has a shorter computation time, 4.53 s and 84.2 s, respectively. Finally, open issues for further research in future work are presented.
引用
收藏
页数:15
相关论文
共 50 条
[1]   Analysing The Impact Of A DDoS Attack Announcement On Victim Stock Prices [J].
Abhishta ;
Joosten, Reinoud ;
Nieuwenhuis, L. J. M. .
2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017), 2017, :354-362
[2]  
Alzahrani Rami J., 2021, Int. J. Comput. Appl., V183, P37
[3]   Detection of Distributed Denial of Service (DDoS) Attacks Using Artificial Intelligence on Cloud [J].
Alzahrani, Saba ;
Hong, Liang .
2018 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2018), 2018, :35-36
[4]  
Anstee D, 2015, 10 ANN WORLDWIDE INF
[5]   A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning [J].
Arturo Perez-Diaz, Jesus ;
Amezcua Valdovinos, Ismael ;
Choo, Kim-Kwang Raymond ;
Zhu, Dakai .
IEEE ACCESS, 2020, 8 :155859-155872
[6]   A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions [J].
Asharf, Javedz ;
Moustafa, Nour ;
Khurshid, Hasnat ;
Debie, Essam ;
Haider, Waqas ;
Wahab, Abdul .
ELECTRONICS, 2020, 9 (07)
[7]  
Caiming Liu, 2011, 2011 Seventh International Conference on Natural Computation (ICNC 2011), P212, DOI 10.1109/ICNC.2011.6022060
[8]  
Conner B, 2003, NETW SECUR, V2003, P16, DOI [10.1016/S1353-4858(03)00011-4, DOI 10.1016/S1353-4858(03)00011-4]
[9]   Security in SDN: A comprehensive survey [J].
Correa Chica, Juan Camilo ;
Cuatindioy Imbachi, Jenny ;
Botero Vega, Juan Felipe .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 159
[10]  
Covington MJ, 2013, INT CONF CYBER CONFL