Comparative Study on TCP SYN Flood DDoS Attack Detection: A Machine Learning Algorithm Based Approach
Affiliation:
1. Department of Computer Science & Engineering, University V.O.C College of Engineering, Thoothukudi – 628008, INDIA 2. Department of Engineering Design, Indian Institute of Technology Madras, Chennai – 600036, INDIA
Abstract
A most common attack on the internet network is a Distributed Denial of Service (DDoS) attack, which involves occupying computational resources and bandwidth to suppress services to potential clients. The attack scenario is to massively flood the packets. The attack is called a denial of service (DoS) if the attack originates from a single server, and a distributed denial of service (DDoS) if the attack originates from multiple servers. Control and mitigation of DDoS attacks have been a research goal for many scholars for over a decade, and they have achieved in delivering a few major DDoS detection and protection techniques. In the current state of internet use, how quickly and early a DDoS attack can be detected in broadcasting network transactions remains a key research goal. After the development of a machine learning algorithm, many potential methods of DDoS attack detection have been developed. The work presents the results of various experiments carried out using data mining and machine learning algorithms as well as a combination of these algorithms on the commonly available dataset named CAIDA for TCP SYN flood attack detection. Also, this work analysis the various performance metrics such as false positive rate, precision, recall, F-measure and receiver operating characteristic (ROC) using various machine learning algorithm. One-R(OR) with an ideal FPR value of 0.05 and recall value of 0.95,decision stump(DS) with an ideal precision value of o.93,PART with an excellent F-measure value of 0.91 are some of the performance metric values while performing TCP SYN flood attack detection.
Publisher
World Scientific and Engineering Academy and Society (WSEAS)
Subject
Artificial Intelligence,General Mathematics,Control and Systems Engineering
Reference47 articles.
1. R. Devi, R.K. Jha, A. Gupta, S. Jain, and P. Kumar “Implementation of Intrusion Detection System using Adaptive Neuro-Fuzzy Inference System for 5G wireless communication network,” AEU-International Journal of Electronics and Communications, vol.74, pp. 94-106, 2017. 2. S. Dash, R. K. Mishra, R. K. Das, and M. Panda “Comparison of AIS based Data Mining Algorithms for Intrusion Detection,” International Journal of Computer Science and Information Security, vol.15, no.1, pp. 619, 2017. 3. L. Zhang, Q. Deng, Y. Su, and Y. Hu, “A boxcovering-based routing algorithm for large-scale SDNs,'' IEEE Access, vol. 5, no. 1, pp. 4048_4056, 2017. 4. P. Wang, H.T. Lin, and T.S. Wang, “An improved ant colony system algorithm for solving the IP traceback problem,'' Information Science, vol. 326, pp. 172-187, 2016. 5. G. Somani, M.S. Gaur, D. Sanghi, and M. Conti,“DDOS Attacks in Cloud Computing: Collateral Damage to Non-targets,” Computer Networks, vol. 109, no. 2, 2016, pp. 157–171.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|