scispace - formally typeset
Open AccessJournal ArticleDOI

A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression

Swathi Sambangi, +1 more
- Vol. 63, Iss: 1, pp 51
Reads0
Chats0
TLDR
The research objective is to study the problem of DDoS attack detection in a Cloud environment by considering the most popular CICIDS 2017 benchmark dataset and applying multiple regression analysis for building a machine learning model to predict DDoS and Bot attacks through considering a Friday afternoon traffic logfile.
Abstract
The problem of identifying Distributed Denial of Service (DDos) attacks is fundamentally a classification problem in machine learning. In relevance to Cloud Computing, the task of identification of DDoS attacks is a significantly challenging problem because of computational complexity that has to be addressed. Fundamentally, a Denial of Service (DoS) attack is an intentional attack attempted by attackers from single source which has an implicit intention of making an application unavailable to the target stakeholder. For this to be achieved, attackers usually stagger the network bandwidth, halting system resources, thus causing denial of access for legitimate users. Contrary to DoS attacks, in DDoS attacks, the attacker makes use of multiple sources to initiate an attack. DDoS attacks are most common at network, transportation, presentation and application layers of a seven-layer OSI model. In this paper, the research objective is to study the problem of DDoS attack detection in a Cloud environment by considering the most popular CICIDS 2017 benchmark dataset and applying multiple regression analysis for building a machine learning model to predict DDoS and Bot attacks through considering a Friday afternoon traffic logfile.

read more

Citations
More filters
Journal ArticleDOI

A Feature Similarity Machine Learning Model for DDoS Attack Detection in Modern Network Environments for Industry 4.0

TL;DR: In this paper , a Gaussian based network traffic similarity function for similarity computation between network traffic instances and a machine learning model SWASTHIKA which uses feature transformation traffic for detection of low rate and high-rate network attacks.
Journal ArticleDOI

Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method

TL;DR: This article presents a method for DDoS attack detection in cloud computing by applying two feature selection techniques, i.e., the Mutual Information (MI) and Random Forest Feature Importance (RFFI) methods, and concludes that the RF performed well in DDoS attacks detection and misclassified only one attack as normal.
Journal ArticleDOI

Predicting DOS-DDOS Attacks: Review and Evaluation Study of Feature Selection Methods based on Wrapper Process

TL;DR: Three important dashboards are presented that are essential to understand the performance of three wrapper strategies commonly used in DOS-DDOS ML systems: heuristic search algorithms, meta-heuristic search and random search methods.
Journal ArticleDOI

Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things

TL;DR: Experimental results obtained show that the proposed IDS based on redefined long short-term memory deep learning approach can effectively detect DoS attacks in IoT networks as it performs better compared to other methods including models from related works.
Journal ArticleDOI

Detecting DDoS attacks using adversarial neural network

TL;DR: Wang et al. as discussed by the authors proposed a DDoS detection method based on the Long Short-Term Memory (LSTM) model, which is a type of Recurrent Neural Networks (RNNs) capable of learning long-term dependencies.
References
More filters
Journal ArticleDOI

Long short-term memory

TL;DR: A novel, efficient, gradient based method called long short-term memory (LSTM) is introduced, which can learn to bridge minimal time lags in excess of 1000 discrete-time steps by enforcing constant error flow through constant error carousels within special units.
Posted Content

Empirical evaluation of gated recurrent neural networks on sequence modeling

TL;DR: These advanced recurrent units that implement a gating mechanism, such as a long short-term memory (LSTM) unit and a recently proposed gated recurrent unit (GRU), are found to be comparable to LSTM.
Journal ArticleDOI

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

TL;DR: The primary intention for this work is to stimulate the research community into developing creative, effective, efficient, and comprehensive prevention, detection, and response mechanisms that address the DDoS flooding problem before, during and after an actual attack.
Journal ArticleDOI

N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders

TL;DR: N-BaIoT as discussed by the authors is a network-based anomaly detection method for the IoT that extracts behavior snapshots of the network and uses deep autoencoders to detect anomalous network traffic from compromised IoT devices.
Proceedings ArticleDOI

Machine Learning DDoS Detection for Consumer Internet of Things Devices

TL;DR: In this paper, the authors demonstrate that using IoT-specific network behaviors (e.g., limited number of endpoints and regular time intervals between packets) to inform feature selection can result in high accuracy DDoS detection in IoT network traffic.
Related Papers (5)