4.6 Article

Predictive machine learning-based integrated approach for DDoS detection and prevention

Journal

MULTIMEDIA TOOLS AND APPLICATIONS
Volume 81, Issue 3, Pages 4185-4211

Publisher

SPRINGER
DOI: 10.1007/s11042-021-11740-z

Keywords

CICIDS2017; DDoS Attack; Machine learning; Classification algorithm; DDoS Detection; DDoS Prevention

Ask authors/readers for more resources

This article discusses the threat of Distributed Denial of Service attacks to the Internet and the use of data mining techniques to detect and prevent such attacks. Various algorithms are used for DDoS attack detection, and a prevention method is proposed to block malicious nodes participating in these attacks.
Distributed Denial of Service attack has been a huge threat to the Internet and may carry extreme losses to systems, companies, and national security. The invader can disseminate Distributed denial of service (DDoS) attacks easily, and it ends up being significantly harder to recognize and forestall DDoS attacks. In recent years, many IT-based companies are attacked by DDoS attacks. In this view, the primary concern of this work is to detect and prevent DDoS attacks. To fulfill the objective, various data mining techniques such that Jrip, J48, and k-NN have been employed for DDoS attacks detection. These algorithms are implemented and thoroughly evaluated individually to validate their performance in this domain. The presented work has been evaluated using the latest dataset CICIDS2017. The dataset characterizes different DDoS attacks viz. brute force SSH, brute force FTP, Heartbleed, infiltration, botnet TCP, UDP, and HTTP with port scan attack. Further, the prevention method takes place in progress to block the malicious nodes participates in any of the said attacks. The proposed DDoS prevention works in a proactive mode to defend all these attack types and gets evaluated concerning various parameters such as Throughput, PDR, End-to-End Delay, and NRL. This study claimed that the proposed technique outperforms with respect to the AODV routing algorithm.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available