Mitigating DDoS Attacks using Smart Detection Techniques

Thumbnail Image

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

There has, of late, been an increase in the frequency and severity of distributed denial-of-service (DDoS) attacks and their negative impacts on the availability of the Internet and Cloud services they target. This activity inevitably leads to a corresponding increase in the time and money that service providers have to commit to fending off these attacks. The hazard it poses in relation to the provision of services via the Internet is now acute. Much or all of the resources of a service delivery platform being attacked in this way are consumed and its bandwidth fully occupied — so that there are no resources remaining to perform the necessary and useful tasks of that platform. These attacks simulate natural traffic, and the malicious effects they have are difficult to detect until it is too late. Thus, the process of attack detection requires sophisticated methodology and algorithms. Machine Learning (ML) can provide a resolution to this issue. In this research we use three different algorithms: Random Forest, Naïve Bayes, and K-Nearest Neighbours; each of these is set the task of providing a suitable model for attack detection. A pre-collected, well-known dataset containing both normal and suspicious traffic is used with these different classification algorithms with a view to producing the best prediction model for selection. To ensure that we select the best prediction model we perform a validation of each by applying it to a test dataset. The results are then analysed via a confusion matrix which is used to determine which algorithm obtains the maximum prediction probability and the minimum false alarm rate. In fact, the Random Forest classifier was found to produce the best prediction model, with a 97 % accuracy rate. Thus it was found that a prediction model generated from a Random Forest classifier is well able to detect attack traffic, obtain the necessary information about any attacking botnets, and forward (via a notification) this information to the local firewall so that it can block suspicions traffic and so stop the distributed denial of service attack.

Description

Keywords

Citation

Endorsement

Review

Supplemented By

Referenced By

Copyright owned by the Saudi Digital Library (SDL) © 2025