Detecting DDoS Attack: A Machine-Learning-Based Approach

Detecting DDoS Attack: A Machine-Learning-Based Approach

Megala G., S. Prabu, Liyanapathirana B. C.
Copyright: © 2021 |Pages: 12
DOI: 10.4018/978-1-7998-3335-2.ch004
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The major network security problems faced by many internet users is the DDoS (distributed denial of service) attack. This attack makes the service inaccessible by exhausting the network and resources with high repudiation and economic loss. It denies the network services to the potential users. To detect this DDoS attack accurately in the network, random forest classifier which is a machine learning based classifier is used. The experimental results are compared with naïve Bayes classifier and KNN classifier showing that random forest produces high accuracy results in classification. Application of machine learning, detecting DDoS attacks is modeled based on the supervised learning algorithm to produce best outcome with high accuracy of training algorithm on network dataset.
Chapter Preview
Top

Introduction

Network provides communication between two parties using various communication protocol (TCP/IP) suite to link devices and transmission medium. Legitimate and authorized users are allowed to use the network. Illegal users or the attackers try to exploit the network by pretending themselves as authentic and access the others data. To admittance others data, attacker use many strategies which are classified as Active and Passive attacks. The attacker endeavors control access on data or the hardware it resides is known as active attack. Whereas the intruder monitors the communications and listens the aspects of the network devices is known as passive attack. A few attacks DDoS (Distributed Denial of Service) attack which comes under Denial of Service (DoS) attack, masquerade attack and session replay attacks falls under this passive attack category. Machine learning model is preferred to identify and classify these complex attacks.

The network technology was also improved to achieve better performance in communication. But it also opens a great loop hole for the attackers to conduct DDoS more effectively. DDoS is a security problem which degrades the services of the legitimate users. This attack targets the resources which may be a victim’s single machine (personal computer) or server or a collection of servers. Since the network is capable of sending large number of packets in small time, the DDoS attackers can easily send a flood of packets to the target through the network, which causes severe damage to the target. The DDoS attack makes the target machine to slow down it’s process and make it to hang. If the target machine is a server, then the server will over flow with requests. So the server can’t responds to the legitimate requests. It also restarts if the attack conduct for a long period of time. During restart the server is not able to filter the requests. The server’s firewall and anti-virus software takes some time to start after server start. At that period of time, the attacker sends malicious files to the target machine to exploit. After exploitation the attacker stops the attack if he wants the data only from the server. Otherwise, the attacker continuously attack the target machine to denial the services provided by the server to the legitimate users. There are many types of DDoS attacks available. But the most famous attacks are, ICMP flood and TCP flood(SYN). Both are capable of denial of service of any type of server. There are many different protection mechanism such as machine learning approach used to prevent the attack as shown in figure1.

Figure 1.

DDoS attack detection

978-1-7998-3335-2.ch004.f01

Different Types of DDoS Attacks

Denial of service attack is the attack where the victims’ service availability is affected and also may provide fake service. Distributed Denial of service (DDoS) attack overwhelms the target network service and disturbs the normal traffic of server by flooding of internet traffic. This DDoS attack exhausts the users’ network bandwidth, network resources and the infrastructure.

Complete Chapter List

Search this Book:
Reset