CFP last date
20 May 2024
Reseach Article

DDoS Attack Detection using Predictive Models

by Sultan Alshehri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 13
Year of Publication: 2019
Authors: Sultan Alshehri
10.5120/ijca2019918900

Sultan Alshehri . DDoS Attack Detection using Predictive Models. International Journal of Computer Applications. 178, 13 ( May 2019), 40-42. DOI=10.5120/ijca2019918900

@article{ 10.5120/ijca2019918900,
author = { Sultan Alshehri },
title = { DDoS Attack Detection using Predictive Models },
journal = { International Journal of Computer Applications },
issue_date = { May 2019 },
volume = { 178 },
number = { 13 },
month = { May },
year = { 2019 },
issn = { 0975-8887 },
pages = { 40-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number13/30594-2019918900/ },
doi = { 10.5120/ijca2019918900 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:50:19.154466+05:30
%A Sultan Alshehri
%T DDoS Attack Detection using Predictive Models
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 13
%P 40-42
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Distributed Denial of Service attack (DDoS) is a crucial issue to those in the security field. It is based on sending many malicious packets to the targeting service, causing failure of normal network services. There are a lot of defense systems developed to overcome this kind of attack. Indeed, predicting the attack at the first stages is an effective solution to give the defender certain amount of time to act. In this paper, a predictive model (Naïve Bayesian) is applied on a KSL-KDD dataset that contains six types of DDoS attack (Neptune, back, land, pod, smurf and teardrop). The model shows high accuracy of 99.99%.

References
  1. David, J. and Thomas, C. (2019). Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic.
  2. Zhong, R. and Yue, G., (2010). DDoS Detection Based on data Mining. Proceedings of the Second International Symposium on Networking and Network Security.
  3. Osanaiye, O., Cai, H., Choo, K., Dehghantanha, A., Xu, Z. and Dlodlo, M. (2016). Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking, 2016(1).
  4. Mousavi, S. and St-Hilaire, M. (2017). Early Detection of DDoS Attacks Against Software Defined Network Controllers. Journal of Network and Systems Management, 26(3), pp.573-591.
  5. Niyaz, Q., Sun, W. and Javaid, A. (2017). A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN). ICST Transactions on Security and Safety, 4(12), p.153515.
  6. Liao, Q., Li, H., Kang, S. and Liu, C. (2015). Application layer DDoS attack detection using cluster with label based on sparse vector decomposition and rhythm matching. Security and Communication Networks, 8(17), pp.3111-3120.
  7. Behal, S., Kumar, K. and Sachdeva, M. (2018). D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events. Journal of Network and Computer Applications, 111, pp.49-63.
  8. Aamir, M. and Zaidi, S. (2019). Clustering based semi-supervised machine learning for DDoS attack classification. Journal of King Saud University - Computer and Information Sciences.
  9. Newman, S. (2019). Under the radar: the danger of stealthy DDoS attacks. Network Security, 2019(2), pp.18-19.
  10. Wang, F., Wang, H., Wang, X. and Su, J. (2012). A new multistage approach to detect subtle DDoS attacks. Mathematical and Computer Modelling, 55(1-2), pp.198-213.
  11. Gupta, R. (2018). Hands-on cybersecurity with blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using blockchain. Birmingham: Packt Publishing.
Index Terms

Computer Science
Information Sciences

Keywords

DDoS detection prediction attack.