A Study On Machine Learning Techniques Towards The Detection of Distributed Denial of Service Attacks
A Study On Machine Learning Techniques Towards The Detection of Distributed Denial of Service Attacks
net/publication/359381269
CITATIONS READS
4 47
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Dr-Naveen Kumar on 21 March 2022.
Abstract
Distributed Denial of Service (DDoS) attacks is a
genuine risk to the network security. Servers of numerous
organizations have been the adversities of such novel sort
of attacks. In a limited ability to focus time, these attacks
from the multiple bots controlled by the botmaster
(cracker) can without much of a stretch deplete the
registering and correspondence assets of the casualty. As
the attacker utilizes the spoofed IP address and thusly
cracker leaves the botnet rapidly after it executes the
charge, accordingly recognizing the attacker is to a great
7407
International Journal of Pure and Applied Mathematics Special Issue
1 INTRODUCTION
The internet gives the network services to the numerous
associations and the administration firms. As of late the web and
network services have experienced the gatecrasher attacks. The
inaccessibility of these services notwithstanding for a brief span
makes the loss of advantages the two clients and the
organizations. Distributed Denial of Service (DDoS) attacks does
not take the information or cash from the casualties, rather its
primary object is to stick the service for quite a while. Since the
client dont have the capacity to re-utilize the services stuck by the
crackers, an organization assaulted by the attacker will lose
numerous advantages.
A DDoS assault can be started from numerous computers
(botnets or zombies) seized by the attacker (botmaster), and
afterward every PC will send an expansive number of packets to
the objective server all the while. The data transfer capacity of
the server gets depleted definitely while reacting to the
approaching packets lastly, the services stop. A botmaster leaves
the botnet rapidly after it had executed the charge and therefore
recognizing the cracker is amazingly troublesome. In this manner
detection of these DDoS attacks is the correct strategy as opposed
to identifying the crackers.
7408
International Journal of Pure and Applied Mathematics Special Issue
7409
International Journal of Pure and Applied Mathematics Special Issue
3 DDOS ATTACK
Distributed denial of service (DDoS) attacks are one of the real
dangers to the present Internet. In DDoS assault an attacker
endeavor to avert real clients of a service from utilizing that
service. DDOS is a distributed denial of service assault did from
numerous sources at the same time, so there’s not only maybe a
couple IP delivers to piece. The outsider services like DNS or
NTP wound up helpless against such attacks, so you are really
observing packets from authentic destinations like organizations
or colleges which can’t be shut down, however there are
continuous tasks to find and inform these locales concerning the
issue and motivate them to fix their service. We layout the subtle
elements of such sort of attacks for clearness as appeared in fig 1.
On the off chance that ’An’ an attacker has IP address 1.2.3.4 and
’B’ casualty has IP address 5.6.7.8, ’A’ can send a packet with ’B’
IP address 5.6.7.8 as the source to xyz.com and say ”disclose to
me about X”. So xyz.com sends a cluster of information to
attacker ’A’ that he didn’t request. In the event that ’A’ do that
to abc.com, def.com and so on all requesting that they send
information to 5.6.7.8, that is a DDOS assault. Subsequently
association cushion of the casualty will be topped off with pending
associations which will never be finished, and in this manner keep
it from noting new demands that might be legitimate.
7410
International Journal of Pure and Applied Mathematics Special Issue
B. ICMP(Ping) Flood
It is like the UDP flood attack. This attack basically misuses
the Internet Control Message Protocol (ICMP) utilized at the
network layer, which empowers clients to send a resound packet to
a remote host to check whether it’s alive. In an ICMP flood
attack the casualty’s network is flooded with ask for packets. This
point is to get an answer from the casualty. By and large sending
packets as quick as conceivable without sitting tight for answers
brings about the consumption of the bandwidth of the casualty’s
network. This sort of attack can expend both active and
approaching bandwidth, since the casualty’s servers will often
endeavor to react with ICMP Echo Reply packets, coming about a
critical general system lull. Completing such an attack is reliant
on attackers knowing the IP address of their objective.
C. Smurf Attack
The Smurf attack utilizes the reverberate reaction component
of ICMP and is like the ICMP flood attack .In a Smurf attack, the
7411
International Journal of Pure and Applied Mathematics Special Issue
7412
International Journal of Pure and Applied Mathematics Special Issue
F. SIDDoS Attacks
SQL Injection Distributed Denial of Service (SIDDoS) is a
cutting edge DDoS application layer attack where attackers embed
a pernicious SQL statement as a string that will go to the site’s
database as a condition (e,g through the information esteems in
the site shape), and afterward wrongfully enabling access to the
resources or to put away information on servers [1]. A SIDDOS
attack devours the server’s resources if the noxious code is then
sent to the server’s execution inconclusively. The SIDDOS attack
make the service inaccessible for customers by changing their own
7413
International Journal of Pure and Applied Mathematics Special Issue
data and in this manner can take the client information. This
kind of DDoS will harmfully affect a web service and make it back
off briefly and interfering with the services.
4 MACHINE LEARNING
TECHNIQUES USED IN DDOS
ATTACK DETECTION
Signature based IDS is a human dependent process as it requires a
few worker hours to test, make and send those signature and
again make new signature for obscure attacks. In this manner it
ends up important to offer a less human dependent system.
Anomaly based IDS based on Machine Learning dialects gives an
answer for this issue, they help in actualizing a system that can
gain from information and give expectation to the concealed
information based on the scholarly information. For instance, we
could prepare machine learning system on approaching packets
with the goal that it can recognize nosy and ordinary packet. Fig
underneath demonstrates a portion of the ordinarily utilized
machine learning techniques for detection of DDoS attack.
A. Naive Bayes
Naive Bayes is based on the Bayesian strategy for performing
the classification process. It is a straightforward and simplest
procedure for developing classifiers: models that appoint class
names to issue occurrences, spoke to as vectors of highlight
esteems, where the class marks are drawn from some limited set.
Paper composed by Kanagalakshmi.R et al. [13] suggested that
utilization of Hidden Nave Bayes (HNB) gives more accurate
outcomes than the conventional Nave Bayes demonstrate.
Covered Naive Bayes (HNB) model can be associated with
interruption discovery issues (DOS attacks) that experience the
evil impacts of dimensionality exceedingly related features and
high system Data stream volumes [13]. It is a data mining model
that extricates the naive Bayes strategies Conditional
fair-mindedness presumption. Mouhammad Alkasassbeh et al [1]
in his paper gathered new dataset that comprise of DDOS attacks
7414
International Journal of Pure and Applied Mathematics Special Issue
7415
International Journal of Pure and Applied Mathematics Special Issue
C. Decision Trees
Decision tree is one of the basic technique utilized as a part of
the machine learning and data mining. It is used as a farsighted
model in which discernments around a thing are mapped to
choices about the thing’s goal regard. In the process of decision
analysis, a decision tree can be utilized to speak to decisions and
decision making outwardly and unequivocally. In this estimation,
the informational collection is learnt and shown. Therefore, at
whatever point another data thing is given for classification, it
will be classified as needs be found out from the past dataset.
Decision Tree calculation can likewise be utilized for DOS attack
detection. Hoda Waguih [2], in his paper proposed a data mining
approach to identify DOS attacks, utilizing classification
techniques. The above approach lays its premise on classifying
”ordinary” traffic against ”strange” traffic in the feeling of DoS
attacks. The paper assesses the performance of J48 decision tree
calculation for the detection of DoS attacks. Md. Farid [3] in their
paper proposed a learning calculation for anomaly based network
intrusion detection system that recognizes attacks from typical
practices and distinguishes distinctive kinds of intrusions utilizing
decision tree calculation. Data set utilized is KDD99 benchmark
network intrusion detection dataset.
10
7416
International Journal of Pure and Applied Mathematics Special Issue
E. K-Mean Clustering
11
7417
International Journal of Pure and Applied Mathematics Special Issue
F. Fuzzy Logic
Fuzzy logic is gotten from fuzzy set theory under which
thinking is estimated instead of definitely gotten from classical
predicate logic. By the assistance of fuzzy factors or phonetic
terms, intrusion detection highlights can be seen effectively and
decision of typical and irregular movement in the network are
based on its fluffiness nature that can distinguish the level of
maliciousness of a hub. This issue separates into two difficulties,
the first being the genuine detection of the DDoS occasion taking
spot and the second being the recognizable proof of the offending
IP addresses. Additionally creator figured out how to acquire
comes about under a 3 sec detection window. R. Shanmugavadivu
planned a fuzzy logic-based system for effectively recognizing the
intrusion exercises inside a network. Creator utilized robotized
12
7418
International Journal of Pure and Applied Mathematics Special Issue
strategy for age of fuzzy rules, which are acquired from the
unequivocal rules utilizing continuous things. The principle
commitment of Fuzzy based detection and prediction system
(FBDPS) was to distinguish the DDoS attackers by contrasting
the vitality utilization of sensor nodes. The nodes with unusual
vitality utilizations are recognized as malicious attacker. Besides,
FBDPS is intended to recognize the kinds of DDoS attack as
indicated by the vitality utilization rate of the malicious nodes.
G. Genetic Algorithms
Genetic Algorithms are another machine learning approach
based on the standards of evolutionary calculation. Genetic
calculation based intrusion detection system is used to recognize
intrusion in view of past direct. A profile is made for the typical
conduct based on that genetic calculation learns and takes the
decision for the concealed patterns. Genetic calculations moreover
used to make rules for organize intrusion detection. Rule set is
generated via preparing GA on KDD Cup 99 data set to recognize
attacks on the system. To generate a rule set, the calculation
considers diverse highlights in network associations of KDD Cup
99. Various Parameters and the evolution processes for GA are
examined and executed. This approach utilizes evolution theory
to information evolution so as to channel the traffic data and in
this manner lessen the multifaceted nature. GA is utilized to
generate rules to distinguish DOS attacks. The GA is prepared on
KDD (Knowledge revelation and data mining) container 99
dataset to generate a rule set that can distinguish DOS attacks.
These rules are connected on IDS system which has a component
of data encryption for shielding packets from intruders.
5 CONCLUSION
After thorough survey, it is reasoned that network attacks are
exceptionally unsafe and IDS/IPS does not take into account the
most recent attacks which are influencing the networks. Machine
learning techniques are assuming imperative part in getting to the
seriousness of the attack and subsequently helping the
associations to take fitting decisions to limit such attacks. In
13
7419
International Journal of Pure and Applied Mathematics Special Issue
References
[1] M. Alkasassbeh, G. Al-Naymat et.al,” Detecting DDoS
Attacks Using Data Mining Technique,” (IJACSA)
International Journal of Advanced Computer Science
and Applications, Vol. 7, pp. 436-445, 2016. Information
Technologies, Vol. 6 (2), pp. 1094-1098, 2015.
14
7420
International Journal of Pure and Applied Mathematics Special Issue
[8] Ashish Kumar, Ruhi Kabra. Layered design for DoS assault
discovery framework by join approach of Naive Bayes
and Improved K-implies Clustering Algorithm, International
Research Journal of Engineering and Technology (IRJET),
Volume: 02 Issue: 03, June-2015.
15
7421
International Journal of Pure and Applied Mathematics Special Issue
16
7422
7423
7424