Regression algorithms for efficient detection and prediction of DDoS attacks

被引:0
|
作者
Dayanandam, Gudipudi. [1 ]
Reddy, E. Srinivasa [2 ]
Babu, Dasari. Bujji [3 ]
机构
[1] ANUCET, Dept CSE, Guntur, India
[2] ANUCET, Guntur, India
[3] QISCET, Dept MCA, Ongole, India
来源
PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT) | 2017年
关键词
Distributed Denial of Service (DDoS); Machine learning; smurf attacks; Random Forest (RE); Neural Networks (NN); Generalized Linear Models (GLM); and Stochastic Gradient Boosting (GBM);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the ICT era the need of depth investigation and analysis is required on network traffic. The analysis should focus on detecting DDoS attacks. In the 21st century the use of communication or transactions arc completely doing through online, the political activists, and international cyber terrorists are choosing the DDoS attacks as a powerful weapon for their illegal an un ethical activities. It is impossible to the human being to identify all these unethical activities, hence the need of machine based algorithms are required. In this paper we used GLM, GBM, NN, RF regression algorithms for detection and prediction of DDoS attacks, and also proved that by using regression algorithms we observed more accurate result than using KNN SVM algorithm.
引用
收藏
页码:215 / 219
页数:5
相关论文
共 50 条
  • [21] Evaluating Machine Learning Algorithms for Detecting DDoS Attacks
    Suresh, Manjula
    Anitha, R.
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 441 - 452
  • [22] Machine learning algorithms to detect DDoS attacks in SDN
    Santos, Reneilson
    Souza, Danilo
    Santo, Walter
    Ribeiro, Admilson
    Moreno, Edward
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (16):
  • [23] Comparing HAProxy Scheduling Algorithms during the DDoS Attacks
    Kumar, Anmol
    Somani, Gaurav
    Agarwal, Mayank
    IEEE Networking Letters, 2024, 6 (02): : 139 - 142
  • [24] An Efficient Authentication Method for Throttling DDoS Attacks
    Rupa, Ch.
    Babu, J. Madhu
    Prasad, P. Siva
    Avadhani, P. S.
    GLOBAL TRENDS IN COMPUTING AND COMMUNICATION SYSTEMS, PT 1, 2012, 269 : 473 - +
  • [25] Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms
    Rios, Vinicius de Miranda
    Inacio, Pedro R. M.
    Magoni, Damien
    Freire, Mario M.
    COMPUTER NETWORKS, 2021, 186
  • [26] DDOS-attacks detection using an efficient measurement-based statistical mechanism
    Bouyeddou, Benamar
    Kadri, Benamar
    Harrou, Fouzi
    Sun, Ying
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2020, 23 (04): : 870 - 878
  • [27] Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms
    Ozgul, Fatih
    Erdem, Zeki
    Bowerman, Chris
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2009, 5477 : 25 - +
  • [28] Analyzing behavior of DDoS attacks to identify DDoS detection features in SDN
    Dayal, Neelam
    Srivastava, Shashank
    2017 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2017, : 274 - 281
  • [29] Detection of DDOS Attacks in Cloud Computing Environment
    Hamdani, Farhaan Noor
    Siddiqui, Farheen
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 83 - 87
  • [30] Relevance of the Gaussian classification on the Detection of DDoS Attacks
    Tapsoba, Abdou Romaric
    Ouedraogo, Tounwendyam Frederic
    Ouedraogo, Arnold Elvis
    2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 42 - 49