On improving the performance of DDoS attack detection system

被引:9
作者
Batchu, Raj Kumar [1 ]
Seetha, Hari [2 ]
机构
[1] AP Univ, Sch Comp Sci & Engn SCOPE, VIT, Vijayawada, Andhra Pradesh, India
[2] AP Univ, Ctr Excellence, AI & Robot, VIT, Vijayawada, Andhra Pradesh, India
关键词
DDoS attacks; Data preprocessing; Feature selection; Extreme learning machine; CICDDoS-2019; dataset; SELECTION; IDENTIFICATION; MITIGATION;
D O I
10.1016/j.micpro.2022.104571
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A DDoS (Distributed Denial of Service) attack is a harmful way of preventing regular access to a targeted machine, resources, or any network by flooding the target or its neighbouring infrastructure with massive traffic in an attempt to cause an interruption. As a result, the network environment's security has suffered significantly. Although numerous ways have been proposed in previous studies, there is still room for new ones as attacker patterns, and strategies change rapidly. This work designs a quick and efficient detection model to identify the latest real-world attacks. An attempt was made for an effective data pre-processing that includes both memory optimization and hybrid feature selection to improve the model's generalizability. Furthermore, the extreme learning machine (ELM) classifier is analyzed with the extracted features by varying weight ranges, hidden neurons, and activation functions to classify the attacks. Experiments are conducted using the CICDDoS-2019 traffic data. The experimental outcomes indicate that the suggested model is superior to previous strategies, with a detection accuracy of 99.94%.
引用
收藏
页数:16
相关论文
共 57 条
[31]   Voting extreme learning machine based distributed denial of service attack detection in cloud computing [J].
Kushwah, Gopal Singh ;
Ranga, Virender .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
[32]   Distributed denial of service attacks detection in cloud computing using extreme learning machine [J].
Kushwah, Gopal Singh ;
Ali, Syed Taqi .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2019, 23 (03) :328-351
[33]   SemiDroid: a behavioral malware detector based on unsupervised machine learning techniques using feature selection approaches [J].
Mahindru, Arvind ;
Sangal, A. L. .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2021, 12 (05) :1369-1411
[34]   Tensor based framework for Distributed Denial of Service attack detection [J].
Maranhao, Joao Paulo A. ;
da Costa, Joao Paulo C. L. ;
Javidi, Elnaz ;
Borges de Andrade, Cesar A. ;
de Sousa Jr, Rafael T. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 174
[35]   A generalized machine learning-based model for the detection of DDoS attacks [J].
Marvi, Murk ;
Arfeen, Asad ;
Uddin, Riaz .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2021, 31 (06)
[36]   Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system [J].
Mittal, Mohit ;
Iwendi, Celestine ;
Khan, Suleman ;
Rehman Javed, Abdul .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (06)
[37]  
Nguyen Hien M., 2011, International Journal of Knowledge Engineering and Soft Data Paradigms, V3, P4, DOI 10.1504/IJKESDP.2011.039875
[38]   Long Short-Term Memory and Fuzzy Logic for Anomaly Detection and Mitigation in Software-Defined Network Environment [J].
Novaes, Matheus P. ;
Carvalho, Luiz F. ;
Lloret, Jaime ;
Proenca Jr, Mario Lemes .
IEEE ACCESS, 2020, 8 :83765-83781
[39]  
Pham N.T., 2018, P AUSTR COMP SCI WEE, P1, DOI DOI 10.1145/3167918.3167951
[40]  
Pontes C., 2021, IEEE TRANS NETW SERV