An Intelligent Model for DDoS Attack Detection and Flash Event Management

An Intelligent Model for DDoS Attack Detection and Flash Event Management

Oreoluwa Carolyn Tinubu, Adesina Simon Sodiya, Olusegun Ayodeji Ojesanmi, Emmanuel Oyeyemi Adeleke, Ahmad Alfawwaz Timehin
Copyright: © 2022 |Pages: 15
DOI: 10.4018/IJDAI.301212
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Distributed Denial of Service (DDoS) attacks are the foremost security concerns on the Internet. DDoS attacks and a similar occurrence called Flash Event (FE) signify anomalies in the normal network traffic, requiring intelligent interventions. This study presents the design and implementation of an intelligent model for the detection of application-layer DDoS attacks and the prevention of service degradations during FE. A Multi-Layer Perceptron (MLP) classifier was used for detecting DDoS attacks on application servers. The FE management system consists of asynchronous processing of requests on a First-In, First-Out (FIFO) basis. A demo application was set up wherein HTTP flood attack was launched and a Flash Event was simulated. The experimental results clearly show that the MLP classifier in comparison with other machine learning classifiers performs best in terms of speed and accuracy. Also, the evaluation of the FE management system shows a great reduction in service degradation. This reflects that the designed model is capable of averting service unavailability on the web.
Article Preview
Top

Introduction

The increase in adoption and versatility of the Internet has influenced an exponential rise in cyber attacks. These attacks on the cyber space have severe impacts on the real world (Ghanbari & Kinsner, 2022). A core threat to cyber security is the Distributed Denial of Service (DDoS) attacks (Yang & Hespanha, 2021). DDoS attacks are coordinated attacks on the availability of services on the Internet (Singh & Gupta, 2016). DDoS attacks are malicious attempts by cybercriminals to make web services, network resources or host machines inaccessible to intended users through a flood of useless packets. Cloud-hosted servers are highly susceptible to DDoS attacks (Alqahtani & Gamble, 2015; Chaudhary et al., 2018). The availability of computing resources is a fundamental characteristic of cloud computing amongst other security necessities (Agrawal & Tapaswi, 2017).

DDoS attacks aim to disrupt networks, applications or web-based services (Dhingra & Sachdeva, 2018). DDoS attacks by overwhelming target servers with floods of bogus traffic consume resources that could service legitimate users. Unlike a traditional Denial of Service (DoS) attack which involves a single machine, modern DDoS attacks involves the use of thousands or millions of zombies, each flooding the server in order to deny access to services by legitimate users. DDoS attacks can easily be launched on web applications, as operating systems and Internet protocols are often prone to vulnerabilities.

DDoS attacks are launched through remotely controlled, well-coordinated and widely dispersed zombies’ botnet devices in a network (Khalaf et al., 2019). Typically, the process of executing a DDoS attack involves a botmaster identifying vulnerable hosts on a network, compromising the hosts with malware, controlling the hosts (the attacker executes code on the hosts without the knowledge of the hosts), and launching the attack (Behal et al., 2019). With evolving technologies such as Internet-of-Things (IoT) and cloud computing, malicious agents can launch massive volumes of DDoS attacks. These launched attacks exhaust the processing and connectivity resources of the target systems resulting in partial or total unavailability (Yusof et al., 2019).

Flooding DDoS attacks can be launched on the Network/Transport and Application layers through protocols as UDP, ICMP, TCP and HTTP (Sharafaldin et al., 2019). Network/Transport (layer 3/4) DDoS attacks are intended to deplete the victim’s network resources as bandwidth and the processing capacity of routers, thereby disrupting the legitimate user’s connectivity. On the other hand, Application (layer 7) DDoS attacks are intended to exhaust the server’s resources like CPU, sockets, memory, input/output bandwidth, causing disruption in the processing of genuine user’s requests. Nowadays, Application-layer DDoS attacks occur more frequently (Behal et al., 2021).

Despite several research efforts geared towards the detection and mitigation of DDoS attacks, these attacks are increasing in volume and severity (Sangodoyin et al., 2018). The frequency of the attacks is tremendously increasing and has become one of the biggest menaces to Internet-connected systems (Shidaganti et al., 2020). DDoS attacks are continually evolving causing service interruptions that results in huge financial losses (Rios et al., 2021). Popular websites such as Netflix, Twitter, GitHub, Airbnb, PayPal, Spotify, The New York Times, Amazon, eBay, BBC, Reddit, CNN and Yahoo have fallen victims to flooding-based DDoS attacks, having severe impacts on the organizations and the users. An effective defense mechanism against DDoS attacks is yet to be developed by security agents (Gaurav et al., 2022; Khalaf et al., 2019).

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 2 Issues (2022)
Volume 13: 2 Issues (2021)
Volume 12: 2 Issues (2020)
Volume 11: 2 Issues (2019)
Volume 10: 2 Issues (2018)
View Complete Journal Contents Listing