Abstract
Dealing with network security has always been challenging, particularly with regard to the detection and prevention of Distributed Denial of Service (DDoS) attacks. Attacks like DDoS bring threats to the network by violating its availability to the probable people who are in need of using that particular server. It is a type of cyber-attack where a network is flooded with a huge amount of traffic, overwhelming the system, and making it unavailable. This type of attack focuses on making the service unavailable to rightful users, without breaching the security perimeter. In a DDoS attack, a master computer hacks a network of vulnerable computers to send a huge quantity of packets to a server from already captured zombie computers. Researchers have suggested various Machine learning (ML) algorithms to detect such attacks. To study and analyse DDoS attacks, researchers have used the CIC-DDoS2019 dataset. To find out how often a DDoS attack happens to a server along with the possible pattern of the attack and type of the attack. This dataset is utilized to train and evaluate ML models for detecting DDoS attacks. In this paper, the primary objective is to propose a decent version of DDoS dataset for investigation and evaluate the performance of various state-of-the-art classifiers, such as Gaussian Naïve Byes (GNB), Bernoulli Naïve Byes (BNB), Random Forest (RF), ID3 Decision Tree (ID3 DT), Logistic Regression (LR), K-Nearest Neighbors (KNN), AdaBoost, CART, and Bagging Classifier ML algorithms to detect DDoS attacks accurately. Along with that, the experimenter showed that DDoS attacks can be identified even more accurately if the attacks are stored in a binary way rather than categorized into 13 different types of attacks in the dataset.
Reference30 articles.
1. S. Chakraborty, P. Kumar, and B. Sinha, "A study on DDoS attacks, danger and its prevention," Int. J. Res. Anal. Rev., vol. 6, no. 2, pp. 10-15, 2019.
2. K. H. Zaboon and A. A. Abdullah, "A Review of the Common DDoS Attack: Types and Protection Approaches Based on Artificial Intelligence," Fusion: Practice and Applications, vol. 7, no. 1, pp. 08-08, Dec. 2021.
3. L. E. Jaramillo, "Malware detection and mitigation techniques: Lessons learned from Mirai DDOS attack," Journal of Information Systems Engineering & Management, vol. 3, no. 3, pp. 19, Jul. 16, 2018.
4. A. I. Jony and S. A. Hamim, “Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age”, Journal of Information Technology and Cyber Security, vol. 1, no. 2, pp. 53-67, 2023.
5. I. V. Kotenko and A. V. Ulanov, "Agent-based simulation of DDoS attacks and defense mechanisms," Journal of Computing, vol. 4, no. 2, pp. 16-37, 2005.