ML Associated DoS and DDoS Attack Observation in Protection

Year : 2024 | Volume :02 | Issue : 01 | Page : 18-26
By

Pratiksha Malekar,

Sayli Bhosale,

Pratiksha Malekar,

Sanika Dhumal,

  1. Student,, Shri Chhatrapati Shivajiraje College of Engineering, Dhangwadi, Bhor, Pune,, Maharashtra,, India
  2. Student,, Shri Chhatrapati Shivajiraje College of Engineering, Dhangwadi, Bhor, Pune,, Maharashtra,, India
  3. Student,, Shri Chhatrapati Shivajiraje College of Engineering, Dhangwadi, Bhor, Pune,, Maharashtra,, India
  4. Student,, Shri Chhatrapati Shivajiraje College of Engineering, Dhangwadi, Bhor, Pune,, Maharashtra,, India

Abstract

‘]

DoS and DDoS assaults are significant risks to the availability and integrity of online services and networks. Attack traffic might come from a variety of geographical regions, making it difficult to filter and neutralize the attack. DDoS attacks are far more sophisticated and powerful than DoS attacks. They use a network of compromised devices, known as a botnet, to launch a coordinated attack on a target. Monitoring and evaluating the network for odd trends, such as rapid increases in traffic volume or changes in traffic distribution. This paper presents an approach for the detection of DoS and DDoS attacks using a combination of mathematical and entropy-based methods. The proposed approach lever ages the inherent characteristics of these attacks to develop robust detection mechanisms that enhance network security. Machine learning algorithms, particularly those based on supervised and unsupervised learning, are becoming increasingly prevalent in the detection of DoS and DDoS attacks. This paper provides insights into the ap plication of machine learning for attack classification and the development of predictive models to anticipate new attack vectors.

Keywords: DoS attack detection, DDoS attack detection, mathematical methods, machine learning, entropy methods

[This article belongs to International Journal of Satellite Remote Sensing (ijsrs)]

How to cite this article:
Pratiksha Malekar, Sayli Bhosale, Pratiksha Malekar, Sanika Dhumal. ML Associated DoS and DDoS Attack Observation in Protection. International Journal of Satellite Remote Sensing. 2024; 02(01):18-26.
How to cite this URL:
Pratiksha Malekar, Sayli Bhosale, Pratiksha Malekar, Sanika Dhumal. ML Associated DoS and DDoS Attack Observation in Protection. International Journal of Satellite Remote Sensing. 2024; 02(01):18-26. Available from: https://journals.stmjournals.com/ijsrs/article=2024/view=170741



References ‘]

  1. An Analysis of DDoS Attacks in a smartphone networks— Utkarsh Saxena, Dr J S Sodhi—2020—An Analysis of DDoS Attacks in a Smart Home Networks IEEE Conference Publication — IEEE Xplore.
  2. Qin, T. Xu and C. Wang,” DDoS Attack Detection Using Flow Entropy and Clustering Technique,” 2015 11th International Conference on Computational Intelligence and Security (CIS),2015, pp. 412-415, doi: 10.1109/CIS.2015.105.
  3. Zlomislic, K. Fertalj and V. Sruk,” Denial of service attacks: An ´ overview,” 2014 9th Iberian Conference on Information Systems and Technologies (CISTI), 2014, pp. 1- 6, doi: 10.1109/CISTI.2014.6876979.
  4. S. Vanitha, S. V. UMA and S. K. Mahidhar,” Distributed denial of service: Attack techniques and mitigation,” 2017 International Conference on Circuits, Controls, and Communications (CCUBE), 2017, pp. 226-231, doi: 10.1109/CCUBE.2017.8394146.
  5. Detection of DDoS Attacks in Software Defined Networking Using Entropy—Cong Fan, Nitheesh Murugan Kaliyamurthy—2021—An Entropy- Based Distributed DDoS Detection Mechanism in Software-Defined Networking — IEEE Conferences Publication — IEEE Xplore.
  6. Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm— Salva Daneshgadeh C¸ akmakc¸I, Thomas Kemmerich— 2023— A Hybrid Approach to Detect DDoS Attacks Using KOAD and the Mahalanobis Distance — IEEE Conference Publication — IEEE Xplore.
  7. Mladenov, B.; Iliev, G. Searching for Optimal Software Defined Network Controller Against DDoS Attacks. In Proceedings of the 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada, 20–22 October 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–4.
  8. Sanjeetha, R.; Benoor, P.; Kanavalli, A. Mitigation of DDoS attacks in Software Defined Networks at application level. In Proceedings of the 2019 PhD Colloquium on Ethically Driven Innovation and Technology for Society (PhD EDITS), Bangalore, India, 18 August 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–3.
  9. 27–29 March 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 624–627. 15. Yadav, S.K.; Suguna, P.; Velusamy, R.L. Entropy based mitigation of Distributed-Denial- of-Service (DDoS) attack on Control Plane in Software-Defined- Network (SDN). In Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, 6– 8 July 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–7.
  10. Gu, K. Li, Z. Guo, and Y. Wang, “Semi- supervised K- means DDoS detection method using hybrid feature selection algorithm,” IEEE Access, vol. 7, pp. 64351– 64365, May 2019, doi:10.1109/AC CESS.2019.2917532.
  11. N. D. Pham, C. K. Yeo, N. Yanai, and T. Fujiwara, “Detecting flooding attack and accommodating burst traffic in delay-tolerantnetworks,” IEEE Trans. Veh. Technol., vol. 67, no.1, pp. 795–808, Jan. 2018.
  12. S. Vanitha, S. V. UMA and S. K. Mahidhar, “Distributed denial of service: Attack techniques and mitigation,” 2017 International Conference on Circuits, Controls, and Communications (CCUBE), 2017, pp. 226-231, doi: 10.1109/CCUBE.2017.8394146.
  13. Kumari, K., Mrunalini, M. (2022). Detecting Denial of Service attacks using machine learningalgorithms. Journal of Big Data, 9(1), 1-17. https://doi.org/10.1186/s40537-022- 00616-0
  14. Jisa David, Ciza Thomas, DDoS Attack DetectionUsing Fast Entropy Approach on Flow- Based Network Traffic, Procedia Computer Science.
  15. Nishanth N, Mujeeb A. Modeling and detection of flooding-based denial-of-service attack in wireless ad hoc network using Bayesian inference. IEEE Systems Journal. 2020 May 4;15(1):17-26.
  16. Elsaeidy AA, Jamalipour A, Munasinghe KS. A hybrid deep learning approach for replay and DDoS attack detection in a smart city. IEEE Access. 2021 Nov 16;9: 154864-75.
  17. Li Z, Zhang H, Shahriar H, Lo D, Qian K, Whitman M, Wu F. Denial of service (dos) attack detection: Performance comparison of supervised machine learning algorithms. In2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) 2020 Aug 17 (pp. 469-474). IEEE.

 


Regular Issue Subscription Original Research
Volume 02
Issue 01
Received May 23, 2024
Accepted June 10, 2024
Published September 7, 2024

Check Our other Platform for Workshops in the field of AI, Biotechnology & Nanotechnology.
Check Out Platform for Webinars in the field of AI, Biotech. & Nanotech.